| Message | Id | Version | Qualifiers | Level | Task | Opcode | Keywords | RecordId | ProviderName | ProviderId | LogName | ProcessId | ThreadId | MachineName | UserId | TimeCreated | ActivityId | RelatedActivityId | ContainerLog | MatchedQueryIds | Bookmark | LevelDisplayName | OpcodeDisplayName | TaskDisplayName | KeywordsDisplayNames | Properties | 
|---|
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x795577
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52768
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17828 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 3872 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:35:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x795577
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17827 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 3872 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:35:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17826 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:35:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17825 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:35:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0x2A7DD
Group:
	Security ID:		S-1-5-32-544
	Group Name:		Administrators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x4fc
	Process Name:		C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 17824 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:35:15 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Cryptographic operation.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	RSA
	Key Name:	2918b4e7-76e8-40a6-811b-dfe4e3ba9c02
	Key Type:	Machine key.
Cryptographic Operation:
	Operation:	Open Key.
	Return Code:	0x0 | 5061 | 0 |  | 0 | 12290 | 0 | -9214364837600034816 | 17823 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:35:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | System Integrity | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Key file operation.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	UNKNOWN
	Key Name:	2918b4e7-76e8-40a6-811b-dfe4e3ba9c02
	Key Type:	Machine key.
Key File Operation Information:
	File Path:	C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\5cf5daefd59ffe267deaaa220897ebe2_afd319b1-89fc-40d0-a8c3-fb9a30758cc0
	Operation:	Read persisted key from file.
	Return Code:	0x0 | 5058 | 0 |  | 0 | 12292 | 0 | -9214364837600034816 | 17822 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:35:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other System Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1652893003-1331440545-3825790115-3929940607
	Account Name:		6285254B-2BA1-4F5C-A3EC-08E47F223EEA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x747598
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17821 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:34:46 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x75A431
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17820 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 1452 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:34:01 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x75A431
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52753
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17819 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 1452 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:33:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x75A431
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17818 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 1452 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:33:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x759D53
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17817 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 1452 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:33:41 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x759D53
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{864C0A12-1B2B-C5AA-D95C-F9E90A1EA40B}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	::1
	Source Port:		0
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17816 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:33:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x759D53
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17815 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:33:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1652893003-1331440545-3825790115-3929940607
	Account Name:		6285254B-2BA1-4F5C-A3EC-08E47F223EEA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x75506E
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17814 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:32:32 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1652893003-1331440545-3825790115-3929940607
	Account Name:		6285254B-2BA1-4F5C-A3EC-08E47F223EEA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x75506E
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17813 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:32:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1652893003-1331440545-3825790115-3929940607
	Account Name:		6285254B-2BA1-4F5C-A3EC-08E47F223EEA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x75506E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17812 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:32:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6285254B-2BA1-4F5C-A3EC-08E47F223EEA
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17811 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:32:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x751FB4
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17810 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:32:00 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x751FB4
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52743
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17809 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:31:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x751FB4
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17808 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:31:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1652893003-1331440545-3825790115-3929940607
	Account Name:		6285254B-2BA1-4F5C-A3EC-08E47F223EEA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x74B881
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17807 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 1452 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:30:14 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1652893003-1331440545-3825790115-3929940607
	Account Name:		6285254B-2BA1-4F5C-A3EC-08E47F223EEA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x74B881
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17806 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 1452 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:30:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1652893003-1331440545-3825790115-3929940607
	Account Name:		6285254B-2BA1-4F5C-A3EC-08E47F223EEA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x74B881
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17805 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 1452 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:30:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6285254B-2BA1-4F5C-A3EC-08E47F223EEA
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17804 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 1452 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:30:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1652893003-1331440545-3825790115-3929940607
	Account Name:		6285254B-2BA1-4F5C-A3EC-08E47F223EEA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x748299
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17803 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 1452 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:30:08 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1652893003-1331440545-3825790115-3929940607
	Account Name:		6285254B-2BA1-4F5C-A3EC-08E47F223EEA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x748299
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17802 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 1452 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:30:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1652893003-1331440545-3825790115-3929940607
	Account Name:		6285254B-2BA1-4F5C-A3EC-08E47F223EEA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x748299
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17801 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 1452 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:30:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6285254B-2BA1-4F5C-A3EC-08E47F223EEA
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17800 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 1452 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:30:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1652893003-1331440545-3825790115-3929940607
	Account Name:		6285254B-2BA1-4F5C-A3EC-08E47F223EEA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x747446
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17799 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 1452 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:30:08 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1652893003-1331440545-3825790115-3929940607
	Account Name:		6285254B-2BA1-4F5C-A3EC-08E47F223EEA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x747598
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17798 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 1452 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:30:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1652893003-1331440545-3825790115-3929940607
	Account Name:		6285254B-2BA1-4F5C-A3EC-08E47F223EEA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x747598
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17797 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 1452 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:30:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6285254B-2BA1-4F5C-A3EC-08E47F223EEA
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17796 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 1452 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:30:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1652893003-1331440545-3825790115-3929940607
	Account Name:		6285254B-2BA1-4F5C-A3EC-08E47F223EEA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x74753F
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17795 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 1452 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:30:08 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1652893003-1331440545-3825790115-3929940607
	Account Name:		6285254B-2BA1-4F5C-A3EC-08E47F223EEA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x74753F
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17794 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 1452 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:30:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1652893003-1331440545-3825790115-3929940607
	Account Name:		6285254B-2BA1-4F5C-A3EC-08E47F223EEA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x74753F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17793 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 1452 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:30:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6285254B-2BA1-4F5C-A3EC-08E47F223EEA
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17792 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 1452 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:30:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1652893003-1331440545-3825790115-3929940607
	Account Name:		6285254B-2BA1-4F5C-A3EC-08E47F223EEA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x7474F2
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17791 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 1452 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:30:08 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1652893003-1331440545-3825790115-3929940607
	Account Name:		6285254B-2BA1-4F5C-A3EC-08E47F223EEA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x7474F2
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17790 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 1452 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:30:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1652893003-1331440545-3825790115-3929940607
	Account Name:		6285254B-2BA1-4F5C-A3EC-08E47F223EEA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x7474F2
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17789 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 1452 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:30:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6285254B-2BA1-4F5C-A3EC-08E47F223EEA
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17788 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 1452 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:30:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1652893003-1331440545-3825790115-3929940607
	Account Name:		6285254B-2BA1-4F5C-A3EC-08E47F223EEA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x747446
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17787 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 1452 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:30:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1652893003-1331440545-3825790115-3929940607
	Account Name:		6285254B-2BA1-4F5C-A3EC-08E47F223EEA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x747446
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17786 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 1452 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:30:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6285254B-2BA1-4F5C-A3EC-08E47F223EEA
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17785 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 1452 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:30:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x74597E
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17784 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 1452 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:29:58 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x74597E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52740
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17783 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 1452 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:29:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x74597E
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17782 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 1452 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:29:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x73F00E
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17781 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:27:53 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x73F00E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52733
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17780 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:27:43 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x73F00E
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17779 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:27:43 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2821668978-1303812269-2810382220-3989055244
	Account Name:		A82F4072-98AD-4DB6-8C07-83A70C27C4ED
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x7280B4
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17778 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:27:06 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x733B39
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17777 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:25:52 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x733B39
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52720
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17776 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:25:42 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x733B39
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17775 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:25:42 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2821668978-1303812269-2810382220-3989055244
	Account Name:		A82F4072-98AD-4DB6-8C07-83A70C27C4ED
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x72D58A
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17774 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:24:13 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2821668978-1303812269-2810382220-3989055244
	Account Name:		A82F4072-98AD-4DB6-8C07-83A70C27C4ED
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x72D58A
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17773 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:24:13 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2821668978-1303812269-2810382220-3989055244
	Account Name:		A82F4072-98AD-4DB6-8C07-83A70C27C4ED
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x72D58A
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17772 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:24:13 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		A82F4072-98AD-4DB6-8C07-83A70C27C4ED
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17771 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:24:13 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2821668978-1303812269-2810382220-3989055244
	Account Name:		A82F4072-98AD-4DB6-8C07-83A70C27C4ED
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x72A15E
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17770 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:24:08 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2821668978-1303812269-2810382220-3989055244
	Account Name:		A82F4072-98AD-4DB6-8C07-83A70C27C4ED
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x72A15E
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17769 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:24:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2821668978-1303812269-2810382220-3989055244
	Account Name:		A82F4072-98AD-4DB6-8C07-83A70C27C4ED
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x72A15E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17768 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:24:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		A82F4072-98AD-4DB6-8C07-83A70C27C4ED
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17767 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:24:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2821668978-1303812269-2810382220-3989055244
	Account Name:		A82F4072-98AD-4DB6-8C07-83A70C27C4ED
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x727F59
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17766 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:24:02 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2821668978-1303812269-2810382220-3989055244
	Account Name:		A82F4072-98AD-4DB6-8C07-83A70C27C4ED
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x7280B4
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17765 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:24:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2821668978-1303812269-2810382220-3989055244
	Account Name:		A82F4072-98AD-4DB6-8C07-83A70C27C4ED
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x7280B4
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17764 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:24:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		A82F4072-98AD-4DB6-8C07-83A70C27C4ED
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17763 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:24:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2821668978-1303812269-2810382220-3989055244
	Account Name:		A82F4072-98AD-4DB6-8C07-83A70C27C4ED
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x72805B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17762 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:24:02 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2821668978-1303812269-2810382220-3989055244
	Account Name:		A82F4072-98AD-4DB6-8C07-83A70C27C4ED
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x72805B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17761 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:24:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2821668978-1303812269-2810382220-3989055244
	Account Name:		A82F4072-98AD-4DB6-8C07-83A70C27C4ED
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x72805B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17760 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:24:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		A82F4072-98AD-4DB6-8C07-83A70C27C4ED
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17759 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:24:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2821668978-1303812269-2810382220-3989055244
	Account Name:		A82F4072-98AD-4DB6-8C07-83A70C27C4ED
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x728011
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17758 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:24:02 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2821668978-1303812269-2810382220-3989055244
	Account Name:		A82F4072-98AD-4DB6-8C07-83A70C27C4ED
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x728011
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17757 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:24:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2821668978-1303812269-2810382220-3989055244
	Account Name:		A82F4072-98AD-4DB6-8C07-83A70C27C4ED
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x728011
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17756 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:24:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		A82F4072-98AD-4DB6-8C07-83A70C27C4ED
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17755 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:24:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2821668978-1303812269-2810382220-3989055244
	Account Name:		A82F4072-98AD-4DB6-8C07-83A70C27C4ED
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x727F59
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17754 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:24:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2821668978-1303812269-2810382220-3989055244
	Account Name:		A82F4072-98AD-4DB6-8C07-83A70C27C4ED
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x727F59
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17753 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:24:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		A82F4072-98AD-4DB6-8C07-83A70C27C4ED
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17752 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:24:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x726997
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17751 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:23:55 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x726997
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52717
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17750 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:23:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x726997
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17749 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:23:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-96657675-1203914256-2142690435-280445053
	Account Name:		05C2E10B-4610-47C2-83DC-B67F7D40B710
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x70EA07
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17748 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:22:10 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-96657675-1203914256-2142690435-280445053
	Account Name:		05C2E10B-4610-47C2-83DC-B67F7D40B710
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x71D774
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17747 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:22:08 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-96657675-1203914256-2142690435-280445053
	Account Name:		05C2E10B-4610-47C2-83DC-B67F7D40B710
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x71D774
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17746 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:22:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-96657675-1203914256-2142690435-280445053
	Account Name:		05C2E10B-4610-47C2-83DC-B67F7D40B710
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x71D774
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17745 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:22:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		05C2E10B-4610-47C2-83DC-B67F7D40B710
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17744 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:22:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x71A71E
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17743 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:21:55 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x71A71E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52710
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17742 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:21:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x71A71E
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17741 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:21:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x7113EE
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17740 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:19:53 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-96657675-1203914256-2142690435-280445053
	Account Name:		05C2E10B-4610-47C2-83DC-B67F7D40B710
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x712DE6
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17739 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:19:41 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-96657675-1203914256-2142690435-280445053
	Account Name:		05C2E10B-4610-47C2-83DC-B67F7D40B710
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x712DE6
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17738 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:19:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-96657675-1203914256-2142690435-280445053
	Account Name:		05C2E10B-4610-47C2-83DC-B67F7D40B710
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x712DE6
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17737 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:19:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		05C2E10B-4610-47C2-83DC-B67F7D40B710
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17736 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:19:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x7113EE
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52708
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17735 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:19:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x7113EE
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17734 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:19:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-96657675-1203914256-2142690435-280445053
	Account Name:		05C2E10B-4610-47C2-83DC-B67F7D40B710
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x70F75E
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17733 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:19:36 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-96657675-1203914256-2142690435-280445053
	Account Name:		05C2E10B-4610-47C2-83DC-B67F7D40B710
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x70F75E
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17732 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:19:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-96657675-1203914256-2142690435-280445053
	Account Name:		05C2E10B-4610-47C2-83DC-B67F7D40B710
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x70F75E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17731 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:19:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		05C2E10B-4610-47C2-83DC-B67F7D40B710
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17730 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:19:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-96657675-1203914256-2142690435-280445053
	Account Name:		05C2E10B-4610-47C2-83DC-B67F7D40B710
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x70E8BD
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17729 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:19:36 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-96657675-1203914256-2142690435-280445053
	Account Name:		05C2E10B-4610-47C2-83DC-B67F7D40B710
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x70EA07
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17728 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:19:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-96657675-1203914256-2142690435-280445053
	Account Name:		05C2E10B-4610-47C2-83DC-B67F7D40B710
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x70EA07
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17727 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:19:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		05C2E10B-4610-47C2-83DC-B67F7D40B710
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17726 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:19:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-96657675-1203914256-2142690435-280445053
	Account Name:		05C2E10B-4610-47C2-83DC-B67F7D40B710
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x70E9AE
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17725 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:19:36 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-96657675-1203914256-2142690435-280445053
	Account Name:		05C2E10B-4610-47C2-83DC-B67F7D40B710
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x70E9AE
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17724 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:19:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-96657675-1203914256-2142690435-280445053
	Account Name:		05C2E10B-4610-47C2-83DC-B67F7D40B710
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x70E9AE
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17723 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:19:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		05C2E10B-4610-47C2-83DC-B67F7D40B710
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17722 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:19:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-96657675-1203914256-2142690435-280445053
	Account Name:		05C2E10B-4610-47C2-83DC-B67F7D40B710
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x70E965
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17721 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:19:36 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-96657675-1203914256-2142690435-280445053
	Account Name:		05C2E10B-4610-47C2-83DC-B67F7D40B710
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x70E965
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17720 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:19:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-96657675-1203914256-2142690435-280445053
	Account Name:		05C2E10B-4610-47C2-83DC-B67F7D40B710
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x70E965
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17719 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:19:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		05C2E10B-4610-47C2-83DC-B67F7D40B710
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17718 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:19:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-96657675-1203914256-2142690435-280445053
	Account Name:		05C2E10B-4610-47C2-83DC-B67F7D40B710
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x70E8BD
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17717 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:19:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-96657675-1203914256-2142690435-280445053
	Account Name:		05C2E10B-4610-47C2-83DC-B67F7D40B710
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x70E8BD
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17716 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:19:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		05C2E10B-4610-47C2-83DC-B67F7D40B710
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17715 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:19:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4150817852-1169320090-1332713356-2502125113
	Account Name:		F768743C-689A-45B2-8C97-6F4F39662395
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6F695D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17714 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:17:51 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x70365E
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17713 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:17:48 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x70365E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52702
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17712 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:17:38 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x70365E
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17711 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:17:38 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4150817852-1169320090-1332713356-2502125113
	Account Name:		F768743C-689A-45B2-8C97-6F4F39662395
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6FA885
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17710 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:16:17 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4150817852-1169320090-1332713356-2502125113
	Account Name:		F768743C-689A-45B2-8C97-6F4F39662395
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6FA885
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17709 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:16:17 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4150817852-1169320090-1332713356-2502125113
	Account Name:		F768743C-689A-45B2-8C97-6F4F39662395
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6FA885
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17708 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:16:17 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		F768743C-689A-45B2-8C97-6F4F39662395
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17707 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:16:17 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4150817852-1169320090-1332713356-2502125113
	Account Name:		F768743C-689A-45B2-8C97-6F4F39662395
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6F7681
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17706 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:16:11 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4150817852-1169320090-1332713356-2502125113
	Account Name:		F768743C-689A-45B2-8C97-6F4F39662395
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6F7681
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17705 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:16:11 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4150817852-1169320090-1332713356-2502125113
	Account Name:		F768743C-689A-45B2-8C97-6F4F39662395
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6F7681
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17704 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:16:11 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		F768743C-689A-45B2-8C97-6F4F39662395
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17703 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:16:11 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4150817852-1169320090-1332713356-2502125113
	Account Name:		F768743C-689A-45B2-8C97-6F4F39662395
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6F6816
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17702 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:16:10 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4150817852-1169320090-1332713356-2502125113
	Account Name:		F768743C-689A-45B2-8C97-6F4F39662395
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6F695D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17701 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:16:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4150817852-1169320090-1332713356-2502125113
	Account Name:		F768743C-689A-45B2-8C97-6F4F39662395
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6F695D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17700 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:16:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		F768743C-689A-45B2-8C97-6F4F39662395
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17699 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:16:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4150817852-1169320090-1332713356-2502125113
	Account Name:		F768743C-689A-45B2-8C97-6F4F39662395
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6F6904
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17698 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:16:10 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4150817852-1169320090-1332713356-2502125113
	Account Name:		F768743C-689A-45B2-8C97-6F4F39662395
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6F6904
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17697 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:16:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4150817852-1169320090-1332713356-2502125113
	Account Name:		F768743C-689A-45B2-8C97-6F4F39662395
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6F6904
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17696 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:16:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		F768743C-689A-45B2-8C97-6F4F39662395
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17695 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:16:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4150817852-1169320090-1332713356-2502125113
	Account Name:		F768743C-689A-45B2-8C97-6F4F39662395
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6F68BB
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17694 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:16:10 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4150817852-1169320090-1332713356-2502125113
	Account Name:		F768743C-689A-45B2-8C97-6F4F39662395
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6F68BB
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17693 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:16:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4150817852-1169320090-1332713356-2502125113
	Account Name:		F768743C-689A-45B2-8C97-6F4F39662395
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6F68BB
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17692 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:16:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		F768743C-689A-45B2-8C97-6F4F39662395
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17691 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:16:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4150817852-1169320090-1332713356-2502125113
	Account Name:		F768743C-689A-45B2-8C97-6F4F39662395
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6F6816
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17690 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:16:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4150817852-1169320090-1332713356-2502125113
	Account Name:		F768743C-689A-45B2-8C97-6F4F39662395
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6F6816
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17689 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:16:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		F768743C-689A-45B2-8C97-6F4F39662395
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17688 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:16:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x6F0F98
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17687 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:51 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2351147190-1313660123-2966119615-269021069
	Account Name:		8C23A8B6-DCDB-4E4C-BF64-CBB08DEF0810
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6EAAD8
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17686 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:50 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x6F0F98
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52695
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17685 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x6F0F98
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17684 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x6EA53D
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17683 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:23 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2351147190-1313660123-2966119615-269021069
	Account Name:		8C23A8B6-DCDB-4E4C-BF64-CBB08DEF0810
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6ECA6B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17682 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:13 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2351147190-1313660123-2966119615-269021069
	Account Name:		8C23A8B6-DCDB-4E4C-BF64-CBB08DEF0810
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6ECA6B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17681 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:13 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2351147190-1313660123-2966119615-269021069
	Account Name:		8C23A8B6-DCDB-4E4C-BF64-CBB08DEF0810
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6ECA6B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17680 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:13 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		8C23A8B6-DCDB-4E4C-BF64-CBB08DEF0810
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17679 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:13 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2351147190-1313660123-2966119615-269021069
	Account Name:		8C23A8B6-DCDB-4E4C-BF64-CBB08DEF0810
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6EB7DA
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17678 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:12 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2351147190-1313660123-2966119615-269021069
	Account Name:		8C23A8B6-DCDB-4E4C-BF64-CBB08DEF0810
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6EB7DA
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17677 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2351147190-1313660123-2966119615-269021069
	Account Name:		8C23A8B6-DCDB-4E4C-BF64-CBB08DEF0810
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6EB7DA
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17676 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		8C23A8B6-DCDB-4E4C-BF64-CBB08DEF0810
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17675 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2351147190-1313660123-2966119615-269021069
	Account Name:		8C23A8B6-DCDB-4E4C-BF64-CBB08DEF0810
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6EA990
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17674 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:12 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2351147190-1313660123-2966119615-269021069
	Account Name:		8C23A8B6-DCDB-4E4C-BF64-CBB08DEF0810
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6EAAD8
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17673 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2351147190-1313660123-2966119615-269021069
	Account Name:		8C23A8B6-DCDB-4E4C-BF64-CBB08DEF0810
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6EAAD8
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17672 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		8C23A8B6-DCDB-4E4C-BF64-CBB08DEF0810
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17671 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2351147190-1313660123-2966119615-269021069
	Account Name:		8C23A8B6-DCDB-4E4C-BF64-CBB08DEF0810
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6EAA7F
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17670 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:11 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2351147190-1313660123-2966119615-269021069
	Account Name:		8C23A8B6-DCDB-4E4C-BF64-CBB08DEF0810
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6EAA7F
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17669 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:11 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2351147190-1313660123-2966119615-269021069
	Account Name:		8C23A8B6-DCDB-4E4C-BF64-CBB08DEF0810
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6EAA7F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17668 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:11 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		8C23A8B6-DCDB-4E4C-BF64-CBB08DEF0810
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17667 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:11 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2351147190-1313660123-2966119615-269021069
	Account Name:		8C23A8B6-DCDB-4E4C-BF64-CBB08DEF0810
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6EAA36
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17666 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:11 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2351147190-1313660123-2966119615-269021069
	Account Name:		8C23A8B6-DCDB-4E4C-BF64-CBB08DEF0810
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6EAA36
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17665 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:11 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2351147190-1313660123-2966119615-269021069
	Account Name:		8C23A8B6-DCDB-4E4C-BF64-CBB08DEF0810
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6EAA36
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17664 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:11 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		8C23A8B6-DCDB-4E4C-BF64-CBB08DEF0810
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17663 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:11 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2351147190-1313660123-2966119615-269021069
	Account Name:		8C23A8B6-DCDB-4E4C-BF64-CBB08DEF0810
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6EA990
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17662 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:11 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2351147190-1313660123-2966119615-269021069
	Account Name:		8C23A8B6-DCDB-4E4C-BF64-CBB08DEF0810
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6EA990
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17661 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:11 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		8C23A8B6-DCDB-4E4C-BF64-CBB08DEF0810
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17660 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:11 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x6EA5A0
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17659 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:07 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x6EA58E
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17658 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:07 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x6EA58D
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17657 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:07 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x6EA5A0
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	CHH2-832929-1
	Source Network Address:	10.222.0.15
	Source Port:		52692
Detailed Authentication Information:
	Logon Process:		NtLmSsp 
	Authentication Package:	NTLM
	Transited Services:	-
	Package Name (NTLM only):	NTLM V2
	Key Length:		128
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17656 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x6EA5A0
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17655 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x6EA58E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	CHH2-832929-1
	Source Network Address:	10.222.0.15
	Source Port:		52690
Detailed Authentication Information:
	Logon Process:		NtLmSsp 
	Authentication Package:	NTLM
	Transited Services:	-
	Package Name (NTLM only):	NTLM V2
	Key Length:		128
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17654 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x6EA58E
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17653 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x6EA58D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	CHH2-832929-1
	Source Network Address:	10.222.0.15
	Source Port:		52691
Detailed Authentication Information:
	Logon Process:		NtLmSsp 
	Authentication Package:	NTLM
	Transited Services:	-
	Package Name (NTLM only):	NTLM V2
	Key Length:		128
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17652 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x6EA58D
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17651 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x6EA53D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	CHH2-832929-1
	Source Network Address:	10.222.0.15
	Source Port:		52689
Detailed Authentication Information:
	Logon Process:		NtLmSsp 
	Authentication Package:	NTLM
	Transited Services:	-
	Package Name (NTLM only):	NTLM V2
	Key Length:		128
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17650 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x6EA53D
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17649 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:15:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x6E1A34
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17648 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:13:51 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-96417770-1232682937-1865531266-3383819882
	Account Name:		05BF37EA-3FB9-4979-82BF-316F6AFEB0C9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6D50C4
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17647 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:13:48 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x6E1A34
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52685
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17646 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:13:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x6E1A34
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17645 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:13:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-96417770-1232682937-1865531266-3383819882
	Account Name:		05BF37EA-3FB9-4979-82BF-316F6AFEB0C9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6D92B6
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17644 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:12:20 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-96417770-1232682937-1865531266-3383819882
	Account Name:		05BF37EA-3FB9-4979-82BF-316F6AFEB0C9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6D92B6
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17643 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:12:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-96417770-1232682937-1865531266-3383819882
	Account Name:		05BF37EA-3FB9-4979-82BF-316F6AFEB0C9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6D92B6
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17642 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:12:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		05BF37EA-3FB9-4979-82BF-316F6AFEB0C9
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17641 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:12:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-96417770-1232682937-1865531266-3383819882
	Account Name:		05BF37EA-3FB9-4979-82BF-316F6AFEB0C9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6D5EF4
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17640 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:12:15 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-96417770-1232682937-1865531266-3383819882
	Account Name:		05BF37EA-3FB9-4979-82BF-316F6AFEB0C9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6D5EF4
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17639 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:12:15 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-96417770-1232682937-1865531266-3383819882
	Account Name:		05BF37EA-3FB9-4979-82BF-316F6AFEB0C9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6D5EF4
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17638 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:12:15 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		05BF37EA-3FB9-4979-82BF-316F6AFEB0C9
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17637 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:12:15 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-96417770-1232682937-1865531266-3383819882
	Account Name:		05BF37EA-3FB9-4979-82BF-316F6AFEB0C9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6D4F76
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17636 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:12:14 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-96417770-1232682937-1865531266-3383819882
	Account Name:		05BF37EA-3FB9-4979-82BF-316F6AFEB0C9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6D50C4
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17635 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:12:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-96417770-1232682937-1865531266-3383819882
	Account Name:		05BF37EA-3FB9-4979-82BF-316F6AFEB0C9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6D50C4
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17634 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:12:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		05BF37EA-3FB9-4979-82BF-316F6AFEB0C9
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17633 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:12:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-96417770-1232682937-1865531266-3383819882
	Account Name:		05BF37EA-3FB9-4979-82BF-316F6AFEB0C9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6D506B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17632 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:12:14 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-96417770-1232682937-1865531266-3383819882
	Account Name:		05BF37EA-3FB9-4979-82BF-316F6AFEB0C9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6D506B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17631 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:12:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-96417770-1232682937-1865531266-3383819882
	Account Name:		05BF37EA-3FB9-4979-82BF-316F6AFEB0C9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6D506B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17630 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:12:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		05BF37EA-3FB9-4979-82BF-316F6AFEB0C9
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17629 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:12:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-96417770-1232682937-1865531266-3383819882
	Account Name:		05BF37EA-3FB9-4979-82BF-316F6AFEB0C9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6D501D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17628 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:12:14 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-96417770-1232682937-1865531266-3383819882
	Account Name:		05BF37EA-3FB9-4979-82BF-316F6AFEB0C9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6D501D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17627 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:12:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-96417770-1232682937-1865531266-3383819882
	Account Name:		05BF37EA-3FB9-4979-82BF-316F6AFEB0C9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6D501D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17626 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:12:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		05BF37EA-3FB9-4979-82BF-316F6AFEB0C9
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17625 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:12:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-96417770-1232682937-1865531266-3383819882
	Account Name:		05BF37EA-3FB9-4979-82BF-316F6AFEB0C9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6D4F76
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17624 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:12:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-96417770-1232682937-1865531266-3383819882
	Account Name:		05BF37EA-3FB9-4979-82BF-316F6AFEB0C9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6D4F76
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17623 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:12:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		05BF37EA-3FB9-4979-82BF-316F6AFEB0C9
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17622 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:12:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x6D2FC2
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17621 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:11:45 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x6D2FC2
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52680
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17620 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:11:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x6D2FC2
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17619 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:11:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3224802291-1242182753-1667781034-3528472313
	Account Name:		C03693F3-3461-4A0A-AA51-6863F93650D2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6B9DA5
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17618 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:10:30 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x6C4CF2
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17617 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:09:49 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x6C4CF2
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52672
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17616 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:09:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x6C4CF2
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17615 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:09:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3224802291-1242182753-1667781034-3528472313
	Account Name:		C03693F3-3461-4A0A-AA51-6863F93650D2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6C148D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17614 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:09:08 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3224802291-1242182753-1667781034-3528472313
	Account Name:		C03693F3-3461-4A0A-AA51-6863F93650D2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6C148D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17613 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:09:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3224802291-1242182753-1667781034-3528472313
	Account Name:		C03693F3-3461-4A0A-AA51-6863F93650D2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6C148D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17612 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:09:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		C03693F3-3461-4A0A-AA51-6863F93650D2
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17611 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:09:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3224802291-1242182753-1667781034-3528472313
	Account Name:		C03693F3-3461-4A0A-AA51-6863F93650D2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6BDC1F
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17610 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:08:47 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3224802291-1242182753-1667781034-3528472313
	Account Name:		C03693F3-3461-4A0A-AA51-6863F93650D2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6BDC1F
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17609 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:08:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3224802291-1242182753-1667781034-3528472313
	Account Name:		C03693F3-3461-4A0A-AA51-6863F93650D2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6BDC1F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17608 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:08:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		C03693F3-3461-4A0A-AA51-6863F93650D2
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17607 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:08:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3224802291-1242182753-1667781034-3528472313
	Account Name:		C03693F3-3461-4A0A-AA51-6863F93650D2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6BAA94
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17606 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:08:43 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3224802291-1242182753-1667781034-3528472313
	Account Name:		C03693F3-3461-4A0A-AA51-6863F93650D2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6BAA94
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17605 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:08:43 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3224802291-1242182753-1667781034-3528472313
	Account Name:		C03693F3-3461-4A0A-AA51-6863F93650D2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6BAA94
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17604 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:08:43 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		C03693F3-3461-4A0A-AA51-6863F93650D2
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17603 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:08:43 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3224802291-1242182753-1667781034-3528472313
	Account Name:		C03693F3-3461-4A0A-AA51-6863F93650D2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6B9BE1
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17602 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:08:42 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3224802291-1242182753-1667781034-3528472313
	Account Name:		C03693F3-3461-4A0A-AA51-6863F93650D2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6B9DA5
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17601 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:08:42 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3224802291-1242182753-1667781034-3528472313
	Account Name:		C03693F3-3461-4A0A-AA51-6863F93650D2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6B9DA5
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17600 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:08:42 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		C03693F3-3461-4A0A-AA51-6863F93650D2
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17599 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:08:42 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3224802291-1242182753-1667781034-3528472313
	Account Name:		C03693F3-3461-4A0A-AA51-6863F93650D2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6B9D4C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17598 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:08:42 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3224802291-1242182753-1667781034-3528472313
	Account Name:		C03693F3-3461-4A0A-AA51-6863F93650D2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6B9D4C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17597 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:08:42 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3224802291-1242182753-1667781034-3528472313
	Account Name:		C03693F3-3461-4A0A-AA51-6863F93650D2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6B9D4C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17596 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:08:42 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		C03693F3-3461-4A0A-AA51-6863F93650D2
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17595 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:08:42 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3224802291-1242182753-1667781034-3528472313
	Account Name:		C03693F3-3461-4A0A-AA51-6863F93650D2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6B9D03
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17594 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:08:42 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3224802291-1242182753-1667781034-3528472313
	Account Name:		C03693F3-3461-4A0A-AA51-6863F93650D2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6B9D03
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17593 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:08:42 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3224802291-1242182753-1667781034-3528472313
	Account Name:		C03693F3-3461-4A0A-AA51-6863F93650D2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6B9D03
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17592 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:08:42 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		C03693F3-3461-4A0A-AA51-6863F93650D2
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17591 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:08:42 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3224802291-1242182753-1667781034-3528472313
	Account Name:		C03693F3-3461-4A0A-AA51-6863F93650D2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6B9BE1
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17590 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:08:42 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3224802291-1242182753-1667781034-3528472313
	Account Name:		C03693F3-3461-4A0A-AA51-6863F93650D2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6B9BE1
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17589 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:08:42 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		C03693F3-3461-4A0A-AA51-6863F93650D2
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17588 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:08:42 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3819174741-1187621815-4197672352-926329168
	Account Name:		E3A3FB55-ABB7-46C9-A065-33FA50A93637
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6A7A1E
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17587 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:07:53 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x6B035E
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17586 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:07:48 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x6B035E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52669
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17585 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:07:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x6B035E
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17584 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:07:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3819174741-1187621815-4197672352-926329168
	Account Name:		E3A3FB55-ABB7-46C9-A065-33FA50A93637
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6B0177
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17583 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:07:32 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3819174741-1187621815-4197672352-926329168
	Account Name:		E3A3FB55-ABB7-46C9-A065-33FA50A93637
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6B0177
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17582 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:07:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3819174741-1187621815-4197672352-926329168
	Account Name:		E3A3FB55-ABB7-46C9-A065-33FA50A93637
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6B0177
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17581 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:07:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E3A3FB55-ABB7-46C9-A065-33FA50A93637
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17580 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:07:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3819174741-1187621815-4197672352-926329168
	Account Name:		E3A3FB55-ABB7-46C9-A065-33FA50A93637
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6AB84E
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17579 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:07:10 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3819174741-1187621815-4197672352-926329168
	Account Name:		E3A3FB55-ABB7-46C9-A065-33FA50A93637
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6AB84E
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17578 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:07:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3819174741-1187621815-4197672352-926329168
	Account Name:		E3A3FB55-ABB7-46C9-A065-33FA50A93637
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6AB84E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17577 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:07:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E3A3FB55-ABB7-46C9-A065-33FA50A93637
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17576 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:07:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3819174741-1187621815-4197672352-926329168
	Account Name:		E3A3FB55-ABB7-46C9-A065-33FA50A93637
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6A8742
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17575 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:07:06 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3819174741-1187621815-4197672352-926329168
	Account Name:		E3A3FB55-ABB7-46C9-A065-33FA50A93637
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6A8742
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17574 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:07:06 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3819174741-1187621815-4197672352-926329168
	Account Name:		E3A3FB55-ABB7-46C9-A065-33FA50A93637
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6A8742
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17573 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:07:06 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E3A3FB55-ABB7-46C9-A065-33FA50A93637
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17572 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:07:06 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3819174741-1187621815-4197672352-926329168
	Account Name:		E3A3FB55-ABB7-46C9-A065-33FA50A93637
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6A78D7
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17571 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:07:05 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3819174741-1187621815-4197672352-926329168
	Account Name:		E3A3FB55-ABB7-46C9-A065-33FA50A93637
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6A7A1E
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17570 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:07:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3819174741-1187621815-4197672352-926329168
	Account Name:		E3A3FB55-ABB7-46C9-A065-33FA50A93637
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6A7A1E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17569 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:07:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E3A3FB55-ABB7-46C9-A065-33FA50A93637
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17568 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:07:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3819174741-1187621815-4197672352-926329168
	Account Name:		E3A3FB55-ABB7-46C9-A065-33FA50A93637
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6A79C5
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17567 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:07:05 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3819174741-1187621815-4197672352-926329168
	Account Name:		E3A3FB55-ABB7-46C9-A065-33FA50A93637
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6A79C5
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17566 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:07:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3819174741-1187621815-4197672352-926329168
	Account Name:		E3A3FB55-ABB7-46C9-A065-33FA50A93637
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6A79C5
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17565 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:07:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E3A3FB55-ABB7-46C9-A065-33FA50A93637
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17564 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:07:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3819174741-1187621815-4197672352-926329168
	Account Name:		E3A3FB55-ABB7-46C9-A065-33FA50A93637
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6A797C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17563 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:07:05 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3819174741-1187621815-4197672352-926329168
	Account Name:		E3A3FB55-ABB7-46C9-A065-33FA50A93637
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6A797C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17562 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:07:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3819174741-1187621815-4197672352-926329168
	Account Name:		E3A3FB55-ABB7-46C9-A065-33FA50A93637
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6A797C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17561 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:07:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E3A3FB55-ABB7-46C9-A065-33FA50A93637
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17560 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:07:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3819174741-1187621815-4197672352-926329168
	Account Name:		E3A3FB55-ABB7-46C9-A065-33FA50A93637
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6A78D7
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17559 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:07:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3819174741-1187621815-4197672352-926329168
	Account Name:		E3A3FB55-ABB7-46C9-A065-33FA50A93637
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6A78D7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17558 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:07:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E3A3FB55-ABB7-46C9-A065-33FA50A93637
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17557 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:07:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2241079103-1112855813-3216835256-2483463261
	Account Name:		8594273F-D505-4254-B802-BDBF5DA40694
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x697F0F
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17556 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:06:56 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2241079103-1112855813-3216835256-2483463261
	Account Name:		8594273F-D505-4254-B802-BDBF5DA40694
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6A06AF
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17555 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:06:36 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2241079103-1112855813-3216835256-2483463261
	Account Name:		8594273F-D505-4254-B802-BDBF5DA40694
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6A06AF
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17554 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:06:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2241079103-1112855813-3216835256-2483463261
	Account Name:		8594273F-D505-4254-B802-BDBF5DA40694
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6A06AF
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17553 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:06:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		8594273F-D505-4254-B802-BDBF5DA40694
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17552 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:06:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2241079103-1112855813-3216835256-2483463261
	Account Name:		8594273F-D505-4254-B802-BDBF5DA40694
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x69BE6C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17551 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:06:14 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2241079103-1112855813-3216835256-2483463261
	Account Name:		8594273F-D505-4254-B802-BDBF5DA40694
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x69BE6C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17550 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:06:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2241079103-1112855813-3216835256-2483463261
	Account Name:		8594273F-D505-4254-B802-BDBF5DA40694
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x69BE6C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17549 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:06:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		8594273F-D505-4254-B802-BDBF5DA40694
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17548 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:06:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2241079103-1112855813-3216835256-2483463261
	Account Name:		8594273F-D505-4254-B802-BDBF5DA40694
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x698C8C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17547 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:06:09 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2241079103-1112855813-3216835256-2483463261
	Account Name:		8594273F-D505-4254-B802-BDBF5DA40694
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x698C8C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17546 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:06:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2241079103-1112855813-3216835256-2483463261
	Account Name:		8594273F-D505-4254-B802-BDBF5DA40694
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x698C8C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17545 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:06:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		8594273F-D505-4254-B802-BDBF5DA40694
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17544 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:06:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2241079103-1112855813-3216835256-2483463261
	Account Name:		8594273F-D505-4254-B802-BDBF5DA40694
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x697DC3
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17543 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:06:08 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2241079103-1112855813-3216835256-2483463261
	Account Name:		8594273F-D505-4254-B802-BDBF5DA40694
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x697F0F
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17542 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:06:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2241079103-1112855813-3216835256-2483463261
	Account Name:		8594273F-D505-4254-B802-BDBF5DA40694
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x697F0F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17541 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:06:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		8594273F-D505-4254-B802-BDBF5DA40694
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17540 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:06:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2241079103-1112855813-3216835256-2483463261
	Account Name:		8594273F-D505-4254-B802-BDBF5DA40694
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x697EB6
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17539 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:06:08 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2241079103-1112855813-3216835256-2483463261
	Account Name:		8594273F-D505-4254-B802-BDBF5DA40694
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x697EB6
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17538 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:06:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2241079103-1112855813-3216835256-2483463261
	Account Name:		8594273F-D505-4254-B802-BDBF5DA40694
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x697EB6
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17537 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:06:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		8594273F-D505-4254-B802-BDBF5DA40694
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17536 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:06:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2241079103-1112855813-3216835256-2483463261
	Account Name:		8594273F-D505-4254-B802-BDBF5DA40694
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x697E69
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17535 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:06:08 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2241079103-1112855813-3216835256-2483463261
	Account Name:		8594273F-D505-4254-B802-BDBF5DA40694
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x697E69
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17534 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:06:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2241079103-1112855813-3216835256-2483463261
	Account Name:		8594273F-D505-4254-B802-BDBF5DA40694
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x697E69
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17533 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:06:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		8594273F-D505-4254-B802-BDBF5DA40694
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17532 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:06:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2241079103-1112855813-3216835256-2483463261
	Account Name:		8594273F-D505-4254-B802-BDBF5DA40694
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x697DC3
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17531 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:06:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2241079103-1112855813-3216835256-2483463261
	Account Name:		8594273F-D505-4254-B802-BDBF5DA40694
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x697DC3
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17530 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:06:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		8594273F-D505-4254-B802-BDBF5DA40694
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17529 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:06:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x695E76
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17528 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:05:43 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x695E76
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52660
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17527 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:05:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x695E76
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17526 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:05:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-543170133-1089524153-2390541756-1108162302
	Account Name:		20601E55-D1B9-40F0-BCC5-7C8EFE360D42
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x68A17C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17525 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:05:13 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-543170133-1089524153-2390541756-1108162302
	Account Name:		20601E55-D1B9-40F0-BCC5-7C8EFE360D42
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x68E03A
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17524 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:04:52 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-543170133-1089524153-2390541756-1108162302
	Account Name:		20601E55-D1B9-40F0-BCC5-7C8EFE360D42
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x68E03A
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17523 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:04:52 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-543170133-1089524153-2390541756-1108162302
	Account Name:		20601E55-D1B9-40F0-BCC5-7C8EFE360D42
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x68E03A
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17522 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:04:52 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		20601E55-D1B9-40F0-BCC5-7C8EFE360D42
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17521 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:04:52 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-543170133-1089524153-2390541756-1108162302
	Account Name:		20601E55-D1B9-40F0-BCC5-7C8EFE360D42
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x68AEDB
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17520 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:04:47 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-543170133-1089524153-2390541756-1108162302
	Account Name:		20601E55-D1B9-40F0-BCC5-7C8EFE360D42
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x68AEDB
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17519 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:04:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-543170133-1089524153-2390541756-1108162302
	Account Name:		20601E55-D1B9-40F0-BCC5-7C8EFE360D42
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x68AEDB
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17518 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:04:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		20601E55-D1B9-40F0-BCC5-7C8EFE360D42
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17517 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:04:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-543170133-1089524153-2390541756-1108162302
	Account Name:		20601E55-D1B9-40F0-BCC5-7C8EFE360D42
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x68A034
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17516 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:04:47 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-543170133-1089524153-2390541756-1108162302
	Account Name:		20601E55-D1B9-40F0-BCC5-7C8EFE360D42
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x68A17C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17515 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:04:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-543170133-1089524153-2390541756-1108162302
	Account Name:		20601E55-D1B9-40F0-BCC5-7C8EFE360D42
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x68A17C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17514 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:04:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		20601E55-D1B9-40F0-BCC5-7C8EFE360D42
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17513 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:04:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-543170133-1089524153-2390541756-1108162302
	Account Name:		20601E55-D1B9-40F0-BCC5-7C8EFE360D42
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x68A123
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17512 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:04:46 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-543170133-1089524153-2390541756-1108162302
	Account Name:		20601E55-D1B9-40F0-BCC5-7C8EFE360D42
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x68A123
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17511 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:04:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-543170133-1089524153-2390541756-1108162302
	Account Name:		20601E55-D1B9-40F0-BCC5-7C8EFE360D42
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x68A123
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17510 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:04:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		20601E55-D1B9-40F0-BCC5-7C8EFE360D42
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17509 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:04:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-543170133-1089524153-2390541756-1108162302
	Account Name:		20601E55-D1B9-40F0-BCC5-7C8EFE360D42
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x68A0DA
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17508 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:04:46 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-543170133-1089524153-2390541756-1108162302
	Account Name:		20601E55-D1B9-40F0-BCC5-7C8EFE360D42
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x68A0DA
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17507 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:04:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-543170133-1089524153-2390541756-1108162302
	Account Name:		20601E55-D1B9-40F0-BCC5-7C8EFE360D42
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x68A0DA
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17506 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:04:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		20601E55-D1B9-40F0-BCC5-7C8EFE360D42
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17505 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:04:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-543170133-1089524153-2390541756-1108162302
	Account Name:		20601E55-D1B9-40F0-BCC5-7C8EFE360D42
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x68A034
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17504 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:04:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-543170133-1089524153-2390541756-1108162302
	Account Name:		20601E55-D1B9-40F0-BCC5-7C8EFE360D42
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x68A034
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17503 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:04:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		20601E55-D1B9-40F0-BCC5-7C8EFE360D42
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17502 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:04:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x67A93E
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17501 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:47 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-547725075-1283217335-2651105925-2499311514
	Account Name:		20A59F13-57B7-4C7C-85AA-049E9A77F894
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x67B68A
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17500 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:45 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x67B327
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17499 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:43 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-547725075-1283217335-2651105925-2499311514
	Account Name:		20A59F13-57B7-4C7C-85AA-049E9A77F894
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x67F257
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17498 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:41 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-547725075-1283217335-2651105925-2499311514
	Account Name:		20A59F13-57B7-4C7C-85AA-049E9A77F894
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x67F257
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17497 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-547725075-1283217335-2651105925-2499311514
	Account Name:		20A59F13-57B7-4C7C-85AA-049E9A77F894
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x67F257
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17496 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		20A59F13-57B7-4C7C-85AA-049E9A77F894
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17495 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-547725075-1283217335-2651105925-2499311514
	Account Name:		20A59F13-57B7-4C7C-85AA-049E9A77F894
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x67DF2C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17494 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:40 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-547725075-1283217335-2651105925-2499311514
	Account Name:		20A59F13-57B7-4C7C-85AA-049E9A77F894
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x67DF2C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17493 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-547725075-1283217335-2651105925-2499311514
	Account Name:		20A59F13-57B7-4C7C-85AA-049E9A77F894
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x67DF2C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17492 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		20A59F13-57B7-4C7C-85AA-049E9A77F894
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17491 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-547725075-1283217335-2651105925-2499311514
	Account Name:		20A59F13-57B7-4C7C-85AA-049E9A77F894
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x67C3E7
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17490 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-547725075-1283217335-2651105925-2499311514
	Account Name:		20A59F13-57B7-4C7C-85AA-049E9A77F894
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x67C3E7
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17489 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-547725075-1283217335-2651105925-2499311514
	Account Name:		20A59F13-57B7-4C7C-85AA-049E9A77F894
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x67C3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17488 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		20A59F13-57B7-4C7C-85AA-049E9A77F894
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17487 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-547725075-1283217335-2651105925-2499311514
	Account Name:		20A59F13-57B7-4C7C-85AA-049E9A77F894
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x67B542
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17486 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-547725075-1283217335-2651105925-2499311514
	Account Name:		20A59F13-57B7-4C7C-85AA-049E9A77F894
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x67B68A
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17485 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-547725075-1283217335-2651105925-2499311514
	Account Name:		20A59F13-57B7-4C7C-85AA-049E9A77F894
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x67B68A
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17484 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		20A59F13-57B7-4C7C-85AA-049E9A77F894
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17483 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-547725075-1283217335-2651105925-2499311514
	Account Name:		20A59F13-57B7-4C7C-85AA-049E9A77F894
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x67B631
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17482 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-547725075-1283217335-2651105925-2499311514
	Account Name:		20A59F13-57B7-4C7C-85AA-049E9A77F894
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x67B631
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17481 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-547725075-1283217335-2651105925-2499311514
	Account Name:		20A59F13-57B7-4C7C-85AA-049E9A77F894
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x67B631
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17480 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		20A59F13-57B7-4C7C-85AA-049E9A77F894
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17479 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-547725075-1283217335-2651105925-2499311514
	Account Name:		20A59F13-57B7-4C7C-85AA-049E9A77F894
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x67B5E8
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17478 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-547725075-1283217335-2651105925-2499311514
	Account Name:		20A59F13-57B7-4C7C-85AA-049E9A77F894
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x67B5E8
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17477 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-547725075-1283217335-2651105925-2499311514
	Account Name:		20A59F13-57B7-4C7C-85AA-049E9A77F894
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x67B5E8
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17476 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		20A59F13-57B7-4C7C-85AA-049E9A77F894
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17475 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-547725075-1283217335-2651105925-2499311514
	Account Name:		20A59F13-57B7-4C7C-85AA-049E9A77F894
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x67B542
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17474 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-547725075-1283217335-2651105925-2499311514
	Account Name:		20A59F13-57B7-4C7C-85AA-049E9A77F894
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x67B542
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17473 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		20A59F13-57B7-4C7C-85AA-049E9A77F894
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17472 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x67B327
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52645
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17471 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:31 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x67B327
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17470 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:31 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x67A994
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17469 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:15 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x67A998
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17468 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:15 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x67A993
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17467 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:15 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x67A998
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	CHH2-832929-1
	Source Network Address:	10.222.0.15
	Source Port:		52640
Detailed Authentication Information:
	Logon Process:		NtLmSsp 
	Authentication Package:	NTLM
	Transited Services:	-
	Package Name (NTLM only):	NTLM V2
	Key Length:		128
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17466 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:15 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x67A994
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	CHH2-832929-1
	Source Network Address:	10.222.0.15
	Source Port:		52639
Detailed Authentication Information:
	Logon Process:		NtLmSsp 
	Authentication Package:	NTLM
	Transited Services:	-
	Package Name (NTLM only):	NTLM V2
	Key Length:		128
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17465 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:15 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x67A998
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17464 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:15 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x67A994
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17463 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:15 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x67A993
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	CHH2-832929-1
	Source Network Address:	10.222.0.15
	Source Port:		52638
Detailed Authentication Information:
	Logon Process:		NtLmSsp 
	Authentication Package:	NTLM
	Transited Services:	-
	Package Name (NTLM only):	NTLM V2
	Key Length:		128
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17462 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:15 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x67A993
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17461 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:15 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x67A93E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	CHH2-832929-1
	Source Network Address:	10.222.0.15
	Source Port:		52637
Detailed Authentication Information:
	Logon Process:		NtLmSsp 
	Authentication Package:	NTLM
	Transited Services:	-
	Package Name (NTLM only):	NTLM V2
	Key Length:		128
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17460 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:15 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x67A93E
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17459 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:03:15 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3466603547-1261331941-2319767466-643918628
	Account Name:		CEA02C1B-65E5-4B2E-AAD7-448A246B6126
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x66FA1C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17458 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:02:25 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3466603547-1261331941-2319767466-643918628
	Account Name:		CEA02C1B-65E5-4B2E-AAD7-448A246B6126
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x671922
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17457 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:02:21 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3466603547-1261331941-2319767466-643918628
	Account Name:		CEA02C1B-65E5-4B2E-AAD7-448A246B6126
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x671922
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17456 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:02:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3466603547-1261331941-2319767466-643918628
	Account Name:		CEA02C1B-65E5-4B2E-AAD7-448A246B6126
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x671922
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17455 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:02:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		CEA02C1B-65E5-4B2E-AAD7-448A246B6126
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17454 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:02:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3466603547-1261331941-2319767466-643918628
	Account Name:		CEA02C1B-65E5-4B2E-AAD7-448A246B6126
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6706CD
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17453 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:02:21 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3466603547-1261331941-2319767466-643918628
	Account Name:		CEA02C1B-65E5-4B2E-AAD7-448A246B6126
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6706CD
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17452 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:02:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3466603547-1261331941-2319767466-643918628
	Account Name:		CEA02C1B-65E5-4B2E-AAD7-448A246B6126
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6706CD
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17451 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:02:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		CEA02C1B-65E5-4B2E-AAD7-448A246B6126
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17450 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:02:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3466603547-1261331941-2319767466-643918628
	Account Name:		CEA02C1B-65E5-4B2E-AAD7-448A246B6126
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x66F8D5
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17449 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:02:20 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3466603547-1261331941-2319767466-643918628
	Account Name:		CEA02C1B-65E5-4B2E-AAD7-448A246B6126
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x66FA1C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17448 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:02:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3466603547-1261331941-2319767466-643918628
	Account Name:		CEA02C1B-65E5-4B2E-AAD7-448A246B6126
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x66FA1C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17447 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:02:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		CEA02C1B-65E5-4B2E-AAD7-448A246B6126
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17446 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:02:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3466603547-1261331941-2319767466-643918628
	Account Name:		CEA02C1B-65E5-4B2E-AAD7-448A246B6126
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x66F9C3
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17445 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:02:20 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3466603547-1261331941-2319767466-643918628
	Account Name:		CEA02C1B-65E5-4B2E-AAD7-448A246B6126
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x66F9C3
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17444 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:02:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3466603547-1261331941-2319767466-643918628
	Account Name:		CEA02C1B-65E5-4B2E-AAD7-448A246B6126
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x66F9C3
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17443 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:02:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		CEA02C1B-65E5-4B2E-AAD7-448A246B6126
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17442 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:02:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3466603547-1261331941-2319767466-643918628
	Account Name:		CEA02C1B-65E5-4B2E-AAD7-448A246B6126
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x66F97A
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17441 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:02:20 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3466603547-1261331941-2319767466-643918628
	Account Name:		CEA02C1B-65E5-4B2E-AAD7-448A246B6126
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x66F97A
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17440 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:02:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3466603547-1261331941-2319767466-643918628
	Account Name:		CEA02C1B-65E5-4B2E-AAD7-448A246B6126
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x66F97A
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17439 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:02:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		CEA02C1B-65E5-4B2E-AAD7-448A246B6126
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17438 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:02:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3466603547-1261331941-2319767466-643918628
	Account Name:		CEA02C1B-65E5-4B2E-AAD7-448A246B6126
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x66F8D5
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17437 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:02:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3466603547-1261331941-2319767466-643918628
	Account Name:		CEA02C1B-65E5-4B2E-AAD7-448A246B6126
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x66F8D5
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17436 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:02:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		CEA02C1B-65E5-4B2E-AAD7-448A246B6126
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17435 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:02:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-189798394-1191913831-255824048-1945631412
	Account Name:		0B5017FA-2967-470B-B090-3F0FB4FAF773
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x663185
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17434 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:02:09 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x666129
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17433 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:01:43 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-189798394-1191913831-255824048-1945631412
	Account Name:		0B5017FA-2967-470B-B090-3F0FB4FAF773
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6672F6
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17432 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:01:31 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-189798394-1191913831-255824048-1945631412
	Account Name:		0B5017FA-2967-470B-B090-3F0FB4FAF773
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6672F6
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17431 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:01:31 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-189798394-1191913831-255824048-1945631412
	Account Name:		0B5017FA-2967-470B-B090-3F0FB4FAF773
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6672F6
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17430 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:01:31 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		0B5017FA-2967-470B-B090-3F0FB4FAF773
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17429 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:01:31 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x666129
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52626
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17428 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:01:30 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x666129
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17427 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:01:30 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-189798394-1191913831-255824048-1945631412
	Account Name:		0B5017FA-2967-470B-B090-3F0FB4FAF773
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x663EE0
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17426 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:01:25 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-189798394-1191913831-255824048-1945631412
	Account Name:		0B5017FA-2967-470B-B090-3F0FB4FAF773
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x663EE0
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17425 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:01:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-189798394-1191913831-255824048-1945631412
	Account Name:		0B5017FA-2967-470B-B090-3F0FB4FAF773
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x663EE0
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17424 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:01:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		0B5017FA-2967-470B-B090-3F0FB4FAF773
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17423 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:01:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-189798394-1191913831-255824048-1945631412
	Account Name:		0B5017FA-2967-470B-B090-3F0FB4FAF773
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x663039
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17422 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:01:24 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-189798394-1191913831-255824048-1945631412
	Account Name:		0B5017FA-2967-470B-B090-3F0FB4FAF773
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x663185
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17421 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:01:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-189798394-1191913831-255824048-1945631412
	Account Name:		0B5017FA-2967-470B-B090-3F0FB4FAF773
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x663185
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17420 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:01:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		0B5017FA-2967-470B-B090-3F0FB4FAF773
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17419 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:01:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-189798394-1191913831-255824048-1945631412
	Account Name:		0B5017FA-2967-470B-B090-3F0FB4FAF773
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x66312B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17418 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:01:24 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-189798394-1191913831-255824048-1945631412
	Account Name:		0B5017FA-2967-470B-B090-3F0FB4FAF773
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x66312B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17417 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:01:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-189798394-1191913831-255824048-1945631412
	Account Name:		0B5017FA-2967-470B-B090-3F0FB4FAF773
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x66312B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17416 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:01:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		0B5017FA-2967-470B-B090-3F0FB4FAF773
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17415 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:01:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-189798394-1191913831-255824048-1945631412
	Account Name:		0B5017FA-2967-470B-B090-3F0FB4FAF773
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6630E0
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17414 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:01:24 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-189798394-1191913831-255824048-1945631412
	Account Name:		0B5017FA-2967-470B-B090-3F0FB4FAF773
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6630E0
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17413 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:01:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-189798394-1191913831-255824048-1945631412
	Account Name:		0B5017FA-2967-470B-B090-3F0FB4FAF773
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6630E0
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17412 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:01:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		0B5017FA-2967-470B-B090-3F0FB4FAF773
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17411 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:01:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-189798394-1191913831-255824048-1945631412
	Account Name:		0B5017FA-2967-470B-B090-3F0FB4FAF773
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x663039
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17410 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:01:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-189798394-1191913831-255824048-1945631412
	Account Name:		0B5017FA-2967-470B-B090-3F0FB4FAF773
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x663039
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17409 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:01:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		0B5017FA-2967-470B-B090-3F0FB4FAF773
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17408 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:01:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2468761809-1305538985-3939092610-1191592947
	Account Name:		932650D1-F1A9-4DD0-82C8-C9EAF3430647
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x65516D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17407 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:01:05 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2468761809-1305538985-3939092610-1191592947
	Account Name:		932650D1-F1A9-4DD0-82C8-C9EAF3430647
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6592F8
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17406 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:00:31 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2468761809-1305538985-3939092610-1191592947
	Account Name:		932650D1-F1A9-4DD0-82C8-C9EAF3430647
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6592F8
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17405 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:00:31 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2468761809-1305538985-3939092610-1191592947
	Account Name:		932650D1-F1A9-4DD0-82C8-C9EAF3430647
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6592F8
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17404 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:00:31 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		932650D1-F1A9-4DD0-82C8-C9EAF3430647
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17403 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:00:31 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2468761809-1305538985-3939092610-1191592947
	Account Name:		932650D1-F1A9-4DD0-82C8-C9EAF3430647
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x655EEA
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17402 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:00:25 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2468761809-1305538985-3939092610-1191592947
	Account Name:		932650D1-F1A9-4DD0-82C8-C9EAF3430647
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x655EEA
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17401 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:00:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2468761809-1305538985-3939092610-1191592947
	Account Name:		932650D1-F1A9-4DD0-82C8-C9EAF3430647
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x655EEA
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17400 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:00:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		932650D1-F1A9-4DD0-82C8-C9EAF3430647
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17399 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:00:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2468761809-1305538985-3939092610-1191592947
	Account Name:		932650D1-F1A9-4DD0-82C8-C9EAF3430647
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x655021
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17398 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:00:24 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2468761809-1305538985-3939092610-1191592947
	Account Name:		932650D1-F1A9-4DD0-82C8-C9EAF3430647
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x65516D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17397 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:00:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2468761809-1305538985-3939092610-1191592947
	Account Name:		932650D1-F1A9-4DD0-82C8-C9EAF3430647
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x65516D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17396 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:00:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		932650D1-F1A9-4DD0-82C8-C9EAF3430647
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17395 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:00:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2468761809-1305538985-3939092610-1191592947
	Account Name:		932650D1-F1A9-4DD0-82C8-C9EAF3430647
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x655114
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17394 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:00:24 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2468761809-1305538985-3939092610-1191592947
	Account Name:		932650D1-F1A9-4DD0-82C8-C9EAF3430647
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x655114
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17393 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:00:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2468761809-1305538985-3939092610-1191592947
	Account Name:		932650D1-F1A9-4DD0-82C8-C9EAF3430647
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x655114
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17392 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:00:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		932650D1-F1A9-4DD0-82C8-C9EAF3430647
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17391 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:00:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2468761809-1305538985-3939092610-1191592947
	Account Name:		932650D1-F1A9-4DD0-82C8-C9EAF3430647
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6550CB
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17390 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:00:24 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2468761809-1305538985-3939092610-1191592947
	Account Name:		932650D1-F1A9-4DD0-82C8-C9EAF3430647
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6550CB
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17389 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:00:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2468761809-1305538985-3939092610-1191592947
	Account Name:		932650D1-F1A9-4DD0-82C8-C9EAF3430647
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6550CB
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17388 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:00:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		932650D1-F1A9-4DD0-82C8-C9EAF3430647
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17387 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:00:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2468761809-1305538985-3939092610-1191592947
	Account Name:		932650D1-F1A9-4DD0-82C8-C9EAF3430647
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x655021
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17386 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:00:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2468761809-1305538985-3939092610-1191592947
	Account Name:		932650D1-F1A9-4DD0-82C8-C9EAF3430647
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x655021
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17385 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:00:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		932650D1-F1A9-4DD0-82C8-C9EAF3430647
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17384 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:00:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2888467931-1250229080-3909365675-3756027532
	Account Name:		AC2A85DB-FB58-4A84-AB2F-04E98C6EE0DF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x646FD2
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17383 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 10:00:06 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x64C90B
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17382 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:59:43 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x64C90B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52607
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17381 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:59:29 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x64C90B
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17380 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:59:29 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2888467931-1250229080-3909365675-3756027532
	Account Name:		AC2A85DB-FB58-4A84-AB2F-04E98C6EE0DF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x64B1E3
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17379 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:59:27 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2888467931-1250229080-3909365675-3756027532
	Account Name:		AC2A85DB-FB58-4A84-AB2F-04E98C6EE0DF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x64B1E3
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17378 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:59:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2888467931-1250229080-3909365675-3756027532
	Account Name:		AC2A85DB-FB58-4A84-AB2F-04E98C6EE0DF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x64B1E3
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17377 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:59:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AC2A85DB-FB58-4A84-AB2F-04E98C6EE0DF
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17376 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:59:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2888467931-1250229080-3909365675-3756027532
	Account Name:		AC2A85DB-FB58-4A84-AB2F-04E98C6EE0DF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x647CD1
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17375 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:59:20 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2888467931-1250229080-3909365675-3756027532
	Account Name:		AC2A85DB-FB58-4A84-AB2F-04E98C6EE0DF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x647CD1
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17374 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:59:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2888467931-1250229080-3909365675-3756027532
	Account Name:		AC2A85DB-FB58-4A84-AB2F-04E98C6EE0DF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x647CD1
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17373 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:59:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AC2A85DB-FB58-4A84-AB2F-04E98C6EE0DF
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17372 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:59:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2888467931-1250229080-3909365675-3756027532
	Account Name:		AC2A85DB-FB58-4A84-AB2F-04E98C6EE0DF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x646E45
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17371 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:59:20 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2888467931-1250229080-3909365675-3756027532
	Account Name:		AC2A85DB-FB58-4A84-AB2F-04E98C6EE0DF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x646FD2
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17370 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:59:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2888467931-1250229080-3909365675-3756027532
	Account Name:		AC2A85DB-FB58-4A84-AB2F-04E98C6EE0DF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x646FD2
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17369 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:59:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AC2A85DB-FB58-4A84-AB2F-04E98C6EE0DF
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17368 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:59:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2888467931-1250229080-3909365675-3756027532
	Account Name:		AC2A85DB-FB58-4A84-AB2F-04E98C6EE0DF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x646F79
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17367 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:59:20 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2888467931-1250229080-3909365675-3756027532
	Account Name:		AC2A85DB-FB58-4A84-AB2F-04E98C6EE0DF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x646F79
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17366 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:59:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2888467931-1250229080-3909365675-3756027532
	Account Name:		AC2A85DB-FB58-4A84-AB2F-04E98C6EE0DF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x646F79
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17365 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:59:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AC2A85DB-FB58-4A84-AB2F-04E98C6EE0DF
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17364 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 4732 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:59:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2888467931-1250229080-3909365675-3756027532
	Account Name:		AC2A85DB-FB58-4A84-AB2F-04E98C6EE0DF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x646F2C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17363 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:59:19 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2888467931-1250229080-3909365675-3756027532
	Account Name:		AC2A85DB-FB58-4A84-AB2F-04E98C6EE0DF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x646F2C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17362 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:59:19 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2888467931-1250229080-3909365675-3756027532
	Account Name:		AC2A85DB-FB58-4A84-AB2F-04E98C6EE0DF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x646F2C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17361 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:59:19 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AC2A85DB-FB58-4A84-AB2F-04E98C6EE0DF
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17360 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:59:19 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2888467931-1250229080-3909365675-3756027532
	Account Name:		AC2A85DB-FB58-4A84-AB2F-04E98C6EE0DF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x646E45
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17359 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:59:19 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2888467931-1250229080-3909365675-3756027532
	Account Name:		AC2A85DB-FB58-4A84-AB2F-04E98C6EE0DF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x646E45
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17358 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:59:19 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AC2A85DB-FB58-4A84-AB2F-04E98C6EE0DF
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17357 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:59:19 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1713897655-1096246086-2657452199-367331049
	Account Name:		662800B7-6346-4157-A780-659EE906E515
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6392AC
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17356 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:52 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1713897655-1096246086-2657452199-367331049
	Account Name:		662800B7-6346-4157-A780-659EE906E515
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x63D036
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17355 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:20 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1713897655-1096246086-2657452199-367331049
	Account Name:		662800B7-6346-4157-A780-659EE906E515
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x63D036
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17354 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1713897655-1096246086-2657452199-367331049
	Account Name:		662800B7-6346-4157-A780-659EE906E515
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x63D036
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17353 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		662800B7-6346-4157-A780-659EE906E515
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17352 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1713897655-1096246086-2657452199-367331049
	Account Name:		662800B7-6346-4157-A780-659EE906E515
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x639F55
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17351 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:17 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1713897655-1096246086-2657452199-367331049
	Account Name:		662800B7-6346-4157-A780-659EE906E515
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x639F55
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17350 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:17 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1713897655-1096246086-2657452199-367331049
	Account Name:		662800B7-6346-4157-A780-659EE906E515
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x639F55
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17349 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:17 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		662800B7-6346-4157-A780-659EE906E515
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17348 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:17 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x62E0F7
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17347 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:16 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1713897655-1096246086-2657452199-367331049
	Account Name:		662800B7-6346-4157-A780-659EE906E515
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x639165
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17346 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:16 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1713897655-1096246086-2657452199-367331049
	Account Name:		662800B7-6346-4157-A780-659EE906E515
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6392AC
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17345 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1713897655-1096246086-2657452199-367331049
	Account Name:		662800B7-6346-4157-A780-659EE906E515
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6392AC
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17344 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		662800B7-6346-4157-A780-659EE906E515
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17343 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1713897655-1096246086-2657452199-367331049
	Account Name:		662800B7-6346-4157-A780-659EE906E515
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x639253
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17342 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:16 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1713897655-1096246086-2657452199-367331049
	Account Name:		662800B7-6346-4157-A780-659EE906E515
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x639253
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17341 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1713897655-1096246086-2657452199-367331049
	Account Name:		662800B7-6346-4157-A780-659EE906E515
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x639253
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17340 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		662800B7-6346-4157-A780-659EE906E515
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17339 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1713897655-1096246086-2657452199-367331049
	Account Name:		662800B7-6346-4157-A780-659EE906E515
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x63920A
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17338 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:16 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1713897655-1096246086-2657452199-367331049
	Account Name:		662800B7-6346-4157-A780-659EE906E515
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x63920A
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17337 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1713897655-1096246086-2657452199-367331049
	Account Name:		662800B7-6346-4157-A780-659EE906E515
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x63920A
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17336 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		662800B7-6346-4157-A780-659EE906E515
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17335 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1713897655-1096246086-2657452199-367331049
	Account Name:		662800B7-6346-4157-A780-659EE906E515
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x639165
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17334 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1713897655-1096246086-2657452199-367331049
	Account Name:		662800B7-6346-4157-A780-659EE906E515
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x639165
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17333 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		662800B7-6346-4157-A780-659EE906E515
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17332 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1402870644-1313952392-1807647420-1043947274
	Account Name:		539E1B74-5288-4E51-BC82-BE6B0A5F393E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x62E770
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17331 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:12 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1402870644-1313952392-1807647420-1043947274
	Account Name:		539E1B74-5288-4E51-BC82-BE6B0A5F393E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x630DE6
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17330 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:06 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1402870644-1313952392-1807647420-1043947274
	Account Name:		539E1B74-5288-4E51-BC82-BE6B0A5F393E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x630DE6
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17329 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:06 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1402870644-1313952392-1807647420-1043947274
	Account Name:		539E1B74-5288-4E51-BC82-BE6B0A5F393E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x630DE6
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17328 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:06 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		539E1B74-5288-4E51-BC82-BE6B0A5F393E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17327 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:06 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1402870644-1313952392-1807647420-1043947274
	Account Name:		539E1B74-5288-4E51-BC82-BE6B0A5F393E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x62F97D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17326 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:05 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1402870644-1313952392-1807647420-1043947274
	Account Name:		539E1B74-5288-4E51-BC82-BE6B0A5F393E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x62F97D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17325 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1402870644-1313952392-1807647420-1043947274
	Account Name:		539E1B74-5288-4E51-BC82-BE6B0A5F393E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x62F97D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17324 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		539E1B74-5288-4E51-BC82-BE6B0A5F393E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17323 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1402870644-1313952392-1807647420-1043947274
	Account Name:		539E1B74-5288-4E51-BC82-BE6B0A5F393E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x62E626
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17322 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:05 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1402870644-1313952392-1807647420-1043947274
	Account Name:		539E1B74-5288-4E51-BC82-BE6B0A5F393E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x62E770
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17321 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1402870644-1313952392-1807647420-1043947274
	Account Name:		539E1B74-5288-4E51-BC82-BE6B0A5F393E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x62E770
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17320 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		539E1B74-5288-4E51-BC82-BE6B0A5F393E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17319 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1402870644-1313952392-1807647420-1043947274
	Account Name:		539E1B74-5288-4E51-BC82-BE6B0A5F393E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x62E717
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17318 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:05 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1402870644-1313952392-1807647420-1043947274
	Account Name:		539E1B74-5288-4E51-BC82-BE6B0A5F393E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x62E717
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17317 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1402870644-1313952392-1807647420-1043947274
	Account Name:		539E1B74-5288-4E51-BC82-BE6B0A5F393E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x62E717
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17316 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		539E1B74-5288-4E51-BC82-BE6B0A5F393E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17315 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1402870644-1313952392-1807647420-1043947274
	Account Name:		539E1B74-5288-4E51-BC82-BE6B0A5F393E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x62E6CE
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17314 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:05 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1402870644-1313952392-1807647420-1043947274
	Account Name:		539E1B74-5288-4E51-BC82-BE6B0A5F393E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x62E6CE
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17313 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1402870644-1313952392-1807647420-1043947274
	Account Name:		539E1B74-5288-4E51-BC82-BE6B0A5F393E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x62E6CE
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17312 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		539E1B74-5288-4E51-BC82-BE6B0A5F393E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17311 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1402870644-1313952392-1807647420-1043947274
	Account Name:		539E1B74-5288-4E51-BC82-BE6B0A5F393E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x62E626
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17310 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1402870644-1313952392-1807647420-1043947274
	Account Name:		539E1B74-5288-4E51-BC82-BE6B0A5F393E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x62E626
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17309 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		539E1B74-5288-4E51-BC82-BE6B0A5F393E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17308 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x62E148
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17307 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:01 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x62E14C
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17306 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:01 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x62E146
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17305 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:01 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x62E148
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	CHH2-832929-1
	Source Network Address:	10.222.0.15
	Source Port:		52595
Detailed Authentication Information:
	Logon Process:		NtLmSsp 
	Authentication Package:	NTLM
	Transited Services:	-
	Package Name (NTLM only):	NTLM V2
	Key Length:		128
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17304 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x62E148
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17303 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x62E14C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	CHH2-832929-1
	Source Network Address:	10.222.0.15
	Source Port:		52597
Detailed Authentication Information:
	Logon Process:		NtLmSsp 
	Authentication Package:	NTLM
	Transited Services:	-
	Package Name (NTLM only):	NTLM V2
	Key Length:		128
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17302 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x62E14C
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17301 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x62E146
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	CHH2-832929-1
	Source Network Address:	10.222.0.15
	Source Port:		52596
Detailed Authentication Information:
	Logon Process:		NtLmSsp 
	Authentication Package:	NTLM
	Transited Services:	-
	Package Name (NTLM only):	NTLM V2
	Key Length:		128
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17300 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x62E146
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17299 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x62E0F7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	CHH2-832929-1
	Source Network Address:	10.222.0.15
	Source Port:		52594
Detailed Authentication Information:
	Logon Process:		NtLmSsp 
	Authentication Package:	NTLM
	Transited Services:	-
	Package Name (NTLM only):	NTLM V2
	Key Length:		128
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17298 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x62E0F7
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17297 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:58:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x62C7C7
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17296 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:57:43 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x62C7C7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52591
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17295 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:57:28 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x62C7C7
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17294 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:57:28 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-901206127-1258710470-198188934-4221488161
	Account Name:		35B7506F-65C6-4B06-861F-D00B21CC9EFB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x620253
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17293 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:57:14 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-901206127-1258710470-198188934-4221488161
	Account Name:		35B7506F-65C6-4B06-861F-D00B21CC9EFB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6240A5
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17292 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:42 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-901206127-1258710470-198188934-4221488161
	Account Name:		35B7506F-65C6-4B06-861F-D00B21CC9EFB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6240A5
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17291 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:42 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-901206127-1258710470-198188934-4221488161
	Account Name:		35B7506F-65C6-4B06-861F-D00B21CC9EFB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6240A5
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17290 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:42 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		35B7506F-65C6-4B06-861F-D00B21CC9EFB
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17289 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:42 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-901206127-1258710470-198188934-4221488161
	Account Name:		35B7506F-65C6-4B06-861F-D00B21CC9EFB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x620F2E
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17288 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:38 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-901206127-1258710470-198188934-4221488161
	Account Name:		35B7506F-65C6-4B06-861F-D00B21CC9EFB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x620F2E
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17287 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:38 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-901206127-1258710470-198188934-4221488161
	Account Name:		35B7506F-65C6-4B06-861F-D00B21CC9EFB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x620F2E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17286 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:38 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		35B7506F-65C6-4B06-861F-D00B21CC9EFB
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17285 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:38 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-901206127-1258710470-198188934-4221488161
	Account Name:		35B7506F-65C6-4B06-861F-D00B21CC9EFB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x62010B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17284 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:37 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-901206127-1258710470-198188934-4221488161
	Account Name:		35B7506F-65C6-4B06-861F-D00B21CC9EFB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x620253
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17283 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-901206127-1258710470-198188934-4221488161
	Account Name:		35B7506F-65C6-4B06-861F-D00B21CC9EFB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x620253
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17282 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		35B7506F-65C6-4B06-861F-D00B21CC9EFB
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17281 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-901206127-1258710470-198188934-4221488161
	Account Name:		35B7506F-65C6-4B06-861F-D00B21CC9EFB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6201FA
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17280 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:37 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-901206127-1258710470-198188934-4221488161
	Account Name:		35B7506F-65C6-4B06-861F-D00B21CC9EFB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6201FA
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17279 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-901206127-1258710470-198188934-4221488161
	Account Name:		35B7506F-65C6-4B06-861F-D00B21CC9EFB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6201FA
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17278 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		35B7506F-65C6-4B06-861F-D00B21CC9EFB
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17277 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-901206127-1258710470-198188934-4221488161
	Account Name:		35B7506F-65C6-4B06-861F-D00B21CC9EFB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6201B1
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17276 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:37 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-901206127-1258710470-198188934-4221488161
	Account Name:		35B7506F-65C6-4B06-861F-D00B21CC9EFB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6201B1
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17275 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-901206127-1258710470-198188934-4221488161
	Account Name:		35B7506F-65C6-4B06-861F-D00B21CC9EFB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6201B1
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17274 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		35B7506F-65C6-4B06-861F-D00B21CC9EFB
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17273 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-901206127-1258710470-198188934-4221488161
	Account Name:		35B7506F-65C6-4B06-861F-D00B21CC9EFB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x62010B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17272 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-901206127-1258710470-198188934-4221488161
	Account Name:		35B7506F-65C6-4B06-861F-D00B21CC9EFB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x62010B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17271 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		35B7506F-65C6-4B06-861F-D00B21CC9EFB
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17270 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-589841158-1182307270-2478635709-3761690995
	Account Name:		23284306-93C6-4678-BDFA-BC9373D936E0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x615F2E
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17269 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:26 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-589841158-1182307270-2478635709-3761690995
	Account Name:		23284306-93C6-4678-BDFA-BC9373D936E0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x619D3C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17268 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:22 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-589841158-1182307270-2478635709-3761690995
	Account Name:		23284306-93C6-4678-BDFA-BC9373D936E0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x619D3C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17267 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-589841158-1182307270-2478635709-3761690995
	Account Name:		23284306-93C6-4678-BDFA-BC9373D936E0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x619D3C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17266 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		23284306-93C6-4678-BDFA-BC9373D936E0
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17265 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-589841158-1182307270-2478635709-3761690995
	Account Name:		23284306-93C6-4678-BDFA-BC9373D936E0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x616BDF
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17264 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:17 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-589841158-1182307270-2478635709-3761690995
	Account Name:		23284306-93C6-4678-BDFA-BC9373D936E0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x616BDF
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17263 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:17 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-589841158-1182307270-2478635709-3761690995
	Account Name:		23284306-93C6-4678-BDFA-BC9373D936E0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x616BDF
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17262 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:17 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		23284306-93C6-4678-BDFA-BC9373D936E0
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17261 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:17 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-589841158-1182307270-2478635709-3761690995
	Account Name:		23284306-93C6-4678-BDFA-BC9373D936E0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x615DE7
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17260 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:16 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-589841158-1182307270-2478635709-3761690995
	Account Name:		23284306-93C6-4678-BDFA-BC9373D936E0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x615F2E
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17259 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-589841158-1182307270-2478635709-3761690995
	Account Name:		23284306-93C6-4678-BDFA-BC9373D936E0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x615F2E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17258 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		23284306-93C6-4678-BDFA-BC9373D936E0
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17257 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-589841158-1182307270-2478635709-3761690995
	Account Name:		23284306-93C6-4678-BDFA-BC9373D936E0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x615ED5
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17256 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:16 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-589841158-1182307270-2478635709-3761690995
	Account Name:		23284306-93C6-4678-BDFA-BC9373D936E0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x615ED5
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17255 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-589841158-1182307270-2478635709-3761690995
	Account Name:		23284306-93C6-4678-BDFA-BC9373D936E0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x615ED5
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17254 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		23284306-93C6-4678-BDFA-BC9373D936E0
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17253 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-589841158-1182307270-2478635709-3761690995
	Account Name:		23284306-93C6-4678-BDFA-BC9373D936E0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x615E8C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17252 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:16 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-589841158-1182307270-2478635709-3761690995
	Account Name:		23284306-93C6-4678-BDFA-BC9373D936E0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x615E8C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17251 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-589841158-1182307270-2478635709-3761690995
	Account Name:		23284306-93C6-4678-BDFA-BC9373D936E0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x615E8C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17250 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		23284306-93C6-4678-BDFA-BC9373D936E0
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17249 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-589841158-1182307270-2478635709-3761690995
	Account Name:		23284306-93C6-4678-BDFA-BC9373D936E0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x615DE7
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17248 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-589841158-1182307270-2478635709-3761690995
	Account Name:		23284306-93C6-4678-BDFA-BC9373D936E0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x615DE7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17247 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		23284306-93C6-4678-BDFA-BC9373D936E0
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17246 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:56:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1327750914-1174042831-1557185933-3595971320
	Account Name:		4F23DF02-78CF-45FA-8DC5-D05CF82A56D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x60542E
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17245 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:55:52 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x604462
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17244 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:55:41 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1327750914-1174042831-1557185933-3595971320
	Account Name:		4F23DF02-78CF-45FA-8DC5-D05CF82A56D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6092F6
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17243 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:55:40 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1327750914-1174042831-1557185933-3595971320
	Account Name:		4F23DF02-78CF-45FA-8DC5-D05CF82A56D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6092F6
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17242 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:55:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1327750914-1174042831-1557185933-3595971320
	Account Name:		4F23DF02-78CF-45FA-8DC5-D05CF82A56D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6092F6
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17241 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:55:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		4F23DF02-78CF-45FA-8DC5-D05CF82A56D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17240 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:55:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1327750914-1174042831-1557185933-3595971320
	Account Name:		4F23DF02-78CF-45FA-8DC5-D05CF82A56D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x606106
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17239 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:55:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1327750914-1174042831-1557185933-3595971320
	Account Name:		4F23DF02-78CF-45FA-8DC5-D05CF82A56D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x606106
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17238 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:55:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1327750914-1174042831-1557185933-3595971320
	Account Name:		4F23DF02-78CF-45FA-8DC5-D05CF82A56D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x606106
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17237 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:55:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		4F23DF02-78CF-45FA-8DC5-D05CF82A56D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17236 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:55:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1327750914-1174042831-1557185933-3595971320
	Account Name:		4F23DF02-78CF-45FA-8DC5-D05CF82A56D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6052E6
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17235 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:55:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1327750914-1174042831-1557185933-3595971320
	Account Name:		4F23DF02-78CF-45FA-8DC5-D05CF82A56D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x60542E
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17234 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:55:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1327750914-1174042831-1557185933-3595971320
	Account Name:		4F23DF02-78CF-45FA-8DC5-D05CF82A56D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x60542E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17233 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:55:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		4F23DF02-78CF-45FA-8DC5-D05CF82A56D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17232 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:55:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1327750914-1174042831-1557185933-3595971320
	Account Name:		4F23DF02-78CF-45FA-8DC5-D05CF82A56D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6053D5
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17231 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:55:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1327750914-1174042831-1557185933-3595971320
	Account Name:		4F23DF02-78CF-45FA-8DC5-D05CF82A56D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6053D5
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17230 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:55:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1327750914-1174042831-1557185933-3595971320
	Account Name:		4F23DF02-78CF-45FA-8DC5-D05CF82A56D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6053D5
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17229 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:55:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		4F23DF02-78CF-45FA-8DC5-D05CF82A56D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17228 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:55:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1327750914-1174042831-1557185933-3595971320
	Account Name:		4F23DF02-78CF-45FA-8DC5-D05CF82A56D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x60538C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17227 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:55:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1327750914-1174042831-1557185933-3595971320
	Account Name:		4F23DF02-78CF-45FA-8DC5-D05CF82A56D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x60538C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17226 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:55:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1327750914-1174042831-1557185933-3595971320
	Account Name:		4F23DF02-78CF-45FA-8DC5-D05CF82A56D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x60538C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17225 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:55:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		4F23DF02-78CF-45FA-8DC5-D05CF82A56D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17224 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:55:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1327750914-1174042831-1557185933-3595971320
	Account Name:		4F23DF02-78CF-45FA-8DC5-D05CF82A56D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6052E6
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17223 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:55:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1327750914-1174042831-1557185933-3595971320
	Account Name:		4F23DF02-78CF-45FA-8DC5-D05CF82A56D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x6052E6
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17222 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:55:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		4F23DF02-78CF-45FA-8DC5-D05CF82A56D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17221 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:55:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x604462
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52577
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17220 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:55:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x604462
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17219 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:55:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1464162040-1102034797-4185810873-204182200
	Account Name:		574556F8-B76D-41AF-B967-7EF9B8922B0C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5E2F59
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17218 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:54:50 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1485859188-1161793514-910844570-24438013
	Account Name:		58906974-8FEA-453F-9A62-4A36FDE47401
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5F1FA8
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17217 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:54:01 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1485859188-1161793514-910844570-24438013
	Account Name:		58906974-8FEA-453F-9A62-4A36FDE47401
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5F5AC0
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17216 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:53:57 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1485859188-1161793514-910844570-24438013
	Account Name:		58906974-8FEA-453F-9A62-4A36FDE47401
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5F5AC0
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17215 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:53:57 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1485859188-1161793514-910844570-24438013
	Account Name:		58906974-8FEA-453F-9A62-4A36FDE47401
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5F5AC0
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17214 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:53:57 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		58906974-8FEA-453F-9A62-4A36FDE47401
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17213 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:53:57 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1485859188-1161793514-910844570-24438013
	Account Name:		58906974-8FEA-453F-9A62-4A36FDE47401
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5F2D6A
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17212 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:53:51 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1485859188-1161793514-910844570-24438013
	Account Name:		58906974-8FEA-453F-9A62-4A36FDE47401
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5F2D6A
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17211 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:53:51 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1485859188-1161793514-910844570-24438013
	Account Name:		58906974-8FEA-453F-9A62-4A36FDE47401
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5F2D6A
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17210 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:53:51 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		58906974-8FEA-453F-9A62-4A36FDE47401
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17209 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:53:51 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1485859188-1161793514-910844570-24438013
	Account Name:		58906974-8FEA-453F-9A62-4A36FDE47401
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5F1E5A
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17208 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:53:50 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1485859188-1161793514-910844570-24438013
	Account Name:		58906974-8FEA-453F-9A62-4A36FDE47401
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5F1FA8
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17207 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:53:50 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1485859188-1161793514-910844570-24438013
	Account Name:		58906974-8FEA-453F-9A62-4A36FDE47401
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5F1FA8
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17206 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:53:50 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		58906974-8FEA-453F-9A62-4A36FDE47401
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17205 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:53:50 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1485859188-1161793514-910844570-24438013
	Account Name:		58906974-8FEA-453F-9A62-4A36FDE47401
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5F1F4F
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17204 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:53:50 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1485859188-1161793514-910844570-24438013
	Account Name:		58906974-8FEA-453F-9A62-4A36FDE47401
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5F1F4F
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17203 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:53:50 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1485859188-1161793514-910844570-24438013
	Account Name:		58906974-8FEA-453F-9A62-4A36FDE47401
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5F1F4F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17202 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:53:50 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		58906974-8FEA-453F-9A62-4A36FDE47401
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17201 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:53:50 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1485859188-1161793514-910844570-24438013
	Account Name:		58906974-8FEA-453F-9A62-4A36FDE47401
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5F1F02
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17200 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:53:50 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1485859188-1161793514-910844570-24438013
	Account Name:		58906974-8FEA-453F-9A62-4A36FDE47401
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5F1F02
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17199 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:53:50 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1485859188-1161793514-910844570-24438013
	Account Name:		58906974-8FEA-453F-9A62-4A36FDE47401
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5F1F02
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17198 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:53:50 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		58906974-8FEA-453F-9A62-4A36FDE47401
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17197 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:53:50 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1485859188-1161793514-910844570-24438013
	Account Name:		58906974-8FEA-453F-9A62-4A36FDE47401
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5F1E5A
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17196 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:53:50 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1485859188-1161793514-910844570-24438013
	Account Name:		58906974-8FEA-453F-9A62-4A36FDE47401
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5F1E5A
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17195 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:53:50 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		58906974-8FEA-453F-9A62-4A36FDE47401
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17194 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:53:50 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x5F05B4
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17193 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:53:41 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x5F05B4
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52571
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17192 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:53:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x5F05B4
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17191 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:53:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1464162040-1102034797-4185810873-204182200
	Account Name:		574556F8-B76D-41AF-B967-7EF9B8922B0C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5EB438
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17190 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:52:29 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1464162040-1102034797-4185810873-204182200
	Account Name:		574556F8-B76D-41AF-B967-7EF9B8922B0C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5EB438
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17189 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:52:29 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1464162040-1102034797-4185810873-204182200
	Account Name:		574556F8-B76D-41AF-B967-7EF9B8922B0C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5EB438
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17188 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:52:29 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		574556F8-B76D-41AF-B967-7EF9B8922B0C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17187 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:52:29 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3593549475-1077958676-3809619105-2628502208
	Account Name:		D63136A3-5814-4040-A12C-12E3C0C2AB9C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5DAD26
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17186 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:52:29 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1464162040-1102034797-4185810873-204182200
	Account Name:		574556F8-B76D-41AF-B967-7EF9B8922B0C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5E4F33
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17185 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:52:24 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1464162040-1102034797-4185810873-204182200
	Account Name:		574556F8-B76D-41AF-B967-7EF9B8922B0C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5E4F33
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17184 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:52:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1464162040-1102034797-4185810873-204182200
	Account Name:		574556F8-B76D-41AF-B967-7EF9B8922B0C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5E4F33
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17183 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:52:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		574556F8-B76D-41AF-B967-7EF9B8922B0C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17182 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:52:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1464162040-1102034797-4185810873-204182200
	Account Name:		574556F8-B76D-41AF-B967-7EF9B8922B0C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5E2DFF
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17181 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:52:18 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1464162040-1102034797-4185810873-204182200
	Account Name:		574556F8-B76D-41AF-B967-7EF9B8922B0C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5E2F59
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17180 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:52:18 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1464162040-1102034797-4185810873-204182200
	Account Name:		574556F8-B76D-41AF-B967-7EF9B8922B0C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5E2F59
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17179 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:52:18 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		574556F8-B76D-41AF-B967-7EF9B8922B0C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17178 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:52:18 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1464162040-1102034797-4185810873-204182200
	Account Name:		574556F8-B76D-41AF-B967-7EF9B8922B0C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5E2F00
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17177 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:52:18 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1464162040-1102034797-4185810873-204182200
	Account Name:		574556F8-B76D-41AF-B967-7EF9B8922B0C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5E2F00
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17176 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:52:18 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1464162040-1102034797-4185810873-204182200
	Account Name:		574556F8-B76D-41AF-B967-7EF9B8922B0C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5E2F00
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17175 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:52:18 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		574556F8-B76D-41AF-B967-7EF9B8922B0C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17174 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:52:18 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1464162040-1102034797-4185810873-204182200
	Account Name:		574556F8-B76D-41AF-B967-7EF9B8922B0C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5E2EB6
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17173 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:52:18 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1464162040-1102034797-4185810873-204182200
	Account Name:		574556F8-B76D-41AF-B967-7EF9B8922B0C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5E2EB6
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17172 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:52:18 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1464162040-1102034797-4185810873-204182200
	Account Name:		574556F8-B76D-41AF-B967-7EF9B8922B0C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5E2EB6
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17171 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:52:18 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		574556F8-B76D-41AF-B967-7EF9B8922B0C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17170 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:52:18 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1464162040-1102034797-4185810873-204182200
	Account Name:		574556F8-B76D-41AF-B967-7EF9B8922B0C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5E2DFF
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17169 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:52:18 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1464162040-1102034797-4185810873-204182200
	Account Name:		574556F8-B76D-41AF-B967-7EF9B8922B0C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5E2DFF
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17168 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:52:18 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		574556F8-B76D-41AF-B967-7EF9B8922B0C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17167 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:52:18 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3593549475-1077958676-3809619105-2628502208
	Account Name:		D63136A3-5814-4040-A12C-12E3C0C2AB9C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5DEC69
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17166 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:51:46 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3593549475-1077958676-3809619105-2628502208
	Account Name:		D63136A3-5814-4040-A12C-12E3C0C2AB9C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5DEC69
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17165 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:51:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3593549475-1077958676-3809619105-2628502208
	Account Name:		D63136A3-5814-4040-A12C-12E3C0C2AB9C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5DEC69
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17164 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:51:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		D63136A3-5814-4040-A12C-12E3C0C2AB9C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17163 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:51:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3593549475-1077958676-3809619105-2628502208
	Account Name:		D63136A3-5814-4040-A12C-12E3C0C2AB9C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5DBA87
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17162 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:51:41 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3593549475-1077958676-3809619105-2628502208
	Account Name:		D63136A3-5814-4040-A12C-12E3C0C2AB9C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5DBA87
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17161 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:51:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3593549475-1077958676-3809619105-2628502208
	Account Name:		D63136A3-5814-4040-A12C-12E3C0C2AB9C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5DBA87
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17160 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:51:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		D63136A3-5814-4040-A12C-12E3C0C2AB9C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17159 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:51:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3593549475-1077958676-3809619105-2628502208
	Account Name:		D63136A3-5814-4040-A12C-12E3C0C2AB9C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5DABDE
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17158 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:51:41 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3593549475-1077958676-3809619105-2628502208
	Account Name:		D63136A3-5814-4040-A12C-12E3C0C2AB9C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5DAD26
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17157 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:51:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3593549475-1077958676-3809619105-2628502208
	Account Name:		D63136A3-5814-4040-A12C-12E3C0C2AB9C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5DAD26
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17156 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:51:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		D63136A3-5814-4040-A12C-12E3C0C2AB9C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17155 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:51:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3593549475-1077958676-3809619105-2628502208
	Account Name:		D63136A3-5814-4040-A12C-12E3C0C2AB9C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5DACCD
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17154 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:51:41 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3593549475-1077958676-3809619105-2628502208
	Account Name:		D63136A3-5814-4040-A12C-12E3C0C2AB9C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5DACCD
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17153 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:51:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3593549475-1077958676-3809619105-2628502208
	Account Name:		D63136A3-5814-4040-A12C-12E3C0C2AB9C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5DACCD
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17152 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:51:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		D63136A3-5814-4040-A12C-12E3C0C2AB9C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17151 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:51:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3593549475-1077958676-3809619105-2628502208
	Account Name:		D63136A3-5814-4040-A12C-12E3C0C2AB9C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5DAC84
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17150 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:51:41 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3593549475-1077958676-3809619105-2628502208
	Account Name:		D63136A3-5814-4040-A12C-12E3C0C2AB9C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5DAC84
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17149 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:51:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3593549475-1077958676-3809619105-2628502208
	Account Name:		D63136A3-5814-4040-A12C-12E3C0C2AB9C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5DAC84
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17148 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:51:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		D63136A3-5814-4040-A12C-12E3C0C2AB9C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17147 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:51:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3593549475-1077958676-3809619105-2628502208
	Account Name:		D63136A3-5814-4040-A12C-12E3C0C2AB9C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5DABDE
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17146 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:51:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3593549475-1077958676-3809619105-2628502208
	Account Name:		D63136A3-5814-4040-A12C-12E3C0C2AB9C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5DABDE
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17145 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:51:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		D63136A3-5814-4040-A12C-12E3C0C2AB9C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17144 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:51:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x5D972F
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17143 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:51:40 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x5D972F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52567
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17142 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:51:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x5D972F
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17141 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:51:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2858201788-1076227097-1376638904-4085827426
	Account Name:		AA5CB2BC-EC19-4025-B8D7-0D5262C788F3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5C11D1
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17140 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:51:16 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-814552202-1091762473-2758764732-3630376787
	Account Name:		308D148A-F929-4112-BC68-6FA4532763D8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5C9EAF
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17139 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:51:10 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-814552202-1091762473-2758764732-3630376787
	Account Name:		308D148A-F929-4112-BC68-6FA4532763D8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5CDE26
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17138 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:50:38 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-814552202-1091762473-2758764732-3630376787
	Account Name:		308D148A-F929-4112-BC68-6FA4532763D8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5CDE26
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17137 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:50:38 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-814552202-1091762473-2758764732-3630376787
	Account Name:		308D148A-F929-4112-BC68-6FA4532763D8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5CDE26
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17136 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:50:38 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		308D148A-F929-4112-BC68-6FA4532763D8
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17135 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:50:38 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-814552202-1091762473-2758764732-3630376787
	Account Name:		308D148A-F929-4112-BC68-6FA4532763D8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5CAC30
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17134 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:50:33 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-814552202-1091762473-2758764732-3630376787
	Account Name:		308D148A-F929-4112-BC68-6FA4532763D8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5CAC30
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17133 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:50:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-814552202-1091762473-2758764732-3630376787
	Account Name:		308D148A-F929-4112-BC68-6FA4532763D8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5CAC30
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17132 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:50:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		308D148A-F929-4112-BC68-6FA4532763D8
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17131 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:50:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-814552202-1091762473-2758764732-3630376787
	Account Name:		308D148A-F929-4112-BC68-6FA4532763D8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5C9D68
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17130 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:50:32 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-814552202-1091762473-2758764732-3630376787
	Account Name:		308D148A-F929-4112-BC68-6FA4532763D8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5C9EAF
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17129 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:50:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-814552202-1091762473-2758764732-3630376787
	Account Name:		308D148A-F929-4112-BC68-6FA4532763D8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5C9EAF
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17128 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:50:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		308D148A-F929-4112-BC68-6FA4532763D8
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17127 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:50:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-814552202-1091762473-2758764732-3630376787
	Account Name:		308D148A-F929-4112-BC68-6FA4532763D8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5C9E56
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17126 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:50:32 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-814552202-1091762473-2758764732-3630376787
	Account Name:		308D148A-F929-4112-BC68-6FA4532763D8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5C9E56
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17125 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:50:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-814552202-1091762473-2758764732-3630376787
	Account Name:		308D148A-F929-4112-BC68-6FA4532763D8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5C9E56
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17124 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:50:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		308D148A-F929-4112-BC68-6FA4532763D8
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17123 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:50:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-814552202-1091762473-2758764732-3630376787
	Account Name:		308D148A-F929-4112-BC68-6FA4532763D8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5C9E0D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17122 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:50:32 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-814552202-1091762473-2758764732-3630376787
	Account Name:		308D148A-F929-4112-BC68-6FA4532763D8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5C9E0D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17121 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:50:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-814552202-1091762473-2758764732-3630376787
	Account Name:		308D148A-F929-4112-BC68-6FA4532763D8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5C9E0D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17120 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:50:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		308D148A-F929-4112-BC68-6FA4532763D8
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17119 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:50:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-814552202-1091762473-2758764732-3630376787
	Account Name:		308D148A-F929-4112-BC68-6FA4532763D8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5C9D68
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17118 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:50:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-814552202-1091762473-2758764732-3630376787
	Account Name:		308D148A-F929-4112-BC68-6FA4532763D8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5C9D68
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17117 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:50:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		308D148A-F929-4112-BC68-6FA4532763D8
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17116 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:50:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2858201788-1076227097-1376638904-4085827426
	Account Name:		AA5CB2BC-EC19-4025-B8D7-0D5262C788F3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5C5071
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17115 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:40 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2858201788-1076227097-1376638904-4085827426
	Account Name:		AA5CB2BC-EC19-4025-B8D7-0D5262C788F3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5C5071
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17114 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2858201788-1076227097-1376638904-4085827426
	Account Name:		AA5CB2BC-EC19-4025-B8D7-0D5262C788F3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5C5071
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17113 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AA5CB2BC-EC19-4025-B8D7-0D5262C788F3
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17112 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x5BBB3E
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17111 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:37 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2858201788-1076227097-1376638904-4085827426
	Account Name:		AA5CB2BC-EC19-4025-B8D7-0D5262C788F3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5C1E8C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17110 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:35 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2858201788-1076227097-1376638904-4085827426
	Account Name:		AA5CB2BC-EC19-4025-B8D7-0D5262C788F3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5C1E8C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17109 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2858201788-1076227097-1376638904-4085827426
	Account Name:		AA5CB2BC-EC19-4025-B8D7-0D5262C788F3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5C1E8C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17108 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AA5CB2BC-EC19-4025-B8D7-0D5262C788F3
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17107 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2858201788-1076227097-1376638904-4085827426
	Account Name:		AA5CB2BC-EC19-4025-B8D7-0D5262C788F3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5C1085
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17106 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2858201788-1076227097-1376638904-4085827426
	Account Name:		AA5CB2BC-EC19-4025-B8D7-0D5262C788F3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5C11D1
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17105 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2858201788-1076227097-1376638904-4085827426
	Account Name:		AA5CB2BC-EC19-4025-B8D7-0D5262C788F3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5C11D1
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17104 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AA5CB2BC-EC19-4025-B8D7-0D5262C788F3
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17103 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2858201788-1076227097-1376638904-4085827426
	Account Name:		AA5CB2BC-EC19-4025-B8D7-0D5262C788F3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5C1178
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17102 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2858201788-1076227097-1376638904-4085827426
	Account Name:		AA5CB2BC-EC19-4025-B8D7-0D5262C788F3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5C1178
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17101 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2858201788-1076227097-1376638904-4085827426
	Account Name:		AA5CB2BC-EC19-4025-B8D7-0D5262C788F3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5C1178
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17100 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AA5CB2BC-EC19-4025-B8D7-0D5262C788F3
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17099 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2858201788-1076227097-1376638904-4085827426
	Account Name:		AA5CB2BC-EC19-4025-B8D7-0D5262C788F3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5C112B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17098 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2858201788-1076227097-1376638904-4085827426
	Account Name:		AA5CB2BC-EC19-4025-B8D7-0D5262C788F3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5C112B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17097 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2858201788-1076227097-1376638904-4085827426
	Account Name:		AA5CB2BC-EC19-4025-B8D7-0D5262C788F3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5C112B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17096 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AA5CB2BC-EC19-4025-B8D7-0D5262C788F3
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17095 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2858201788-1076227097-1376638904-4085827426
	Account Name:		AA5CB2BC-EC19-4025-B8D7-0D5262C788F3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5C1085
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17094 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2858201788-1076227097-1376638904-4085827426
	Account Name:		AA5CB2BC-EC19-4025-B8D7-0D5262C788F3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5C1085
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17093 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AA5CB2BC-EC19-4025-B8D7-0D5262C788F3
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17092 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1575259796-1242272869-1266881416-1006115058
	Account Name:		5DE48E94-9465-4A0B-8813-834BF218F83B
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5A378F
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17091 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:30 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x5BBB3E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52549
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17090 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x5BBB3E
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17089 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1575259796-1242272869-1266881416-1006115058
	Account Name:		5DE48E94-9465-4A0B-8813-834BF218F83B
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5BA0A8
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17088 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:13 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1575259796-1242272869-1266881416-1006115058
	Account Name:		5DE48E94-9465-4A0B-8813-834BF218F83B
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5BA0A8
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17087 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:13 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1575259796-1242272869-1266881416-1006115058
	Account Name:		5DE48E94-9465-4A0B-8813-834BF218F83B
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5BA0A8
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17086 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:13 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		5DE48E94-9465-4A0B-8813-834BF218F83B
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17085 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:13 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1744496846-1260847899-3463414960-1318683051
	Account Name:		67FAE8CE-031B-4B27-B084-6FCEAB81994E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5ACC99
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17084 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:49:06 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1744496846-1260847899-3463414960-1318683051
	Account Name:		67FAE8CE-031B-4B27-B084-6FCEAB81994E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5AF5C9
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17083 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:22 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1744496846-1260847899-3463414960-1318683051
	Account Name:		67FAE8CE-031B-4B27-B084-6FCEAB81994E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5AF5C9
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17082 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1744496846-1260847899-3463414960-1318683051
	Account Name:		67FAE8CE-031B-4B27-B084-6FCEAB81994E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5AF5C9
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17081 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		67FAE8CE-031B-4B27-B084-6FCEAB81994E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17080 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1744496846-1260847899-3463414960-1318683051
	Account Name:		67FAE8CE-031B-4B27-B084-6FCEAB81994E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5AD97B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17079 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:21 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1744496846-1260847899-3463414960-1318683051
	Account Name:		67FAE8CE-031B-4B27-B084-6FCEAB81994E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5AD97B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17078 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1744496846-1260847899-3463414960-1318683051
	Account Name:		67FAE8CE-031B-4B27-B084-6FCEAB81994E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5AD97B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17077 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		67FAE8CE-031B-4B27-B084-6FCEAB81994E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17076 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1744496846-1260847899-3463414960-1318683051
	Account Name:		67FAE8CE-031B-4B27-B084-6FCEAB81994E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5ACB50
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17075 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:21 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1744496846-1260847899-3463414960-1318683051
	Account Name:		67FAE8CE-031B-4B27-B084-6FCEAB81994E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5ACC99
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17074 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1744496846-1260847899-3463414960-1318683051
	Account Name:		67FAE8CE-031B-4B27-B084-6FCEAB81994E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5ACC99
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17073 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		67FAE8CE-031B-4B27-B084-6FCEAB81994E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17072 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1744496846-1260847899-3463414960-1318683051
	Account Name:		67FAE8CE-031B-4B27-B084-6FCEAB81994E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5ACC40
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17071 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:21 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1744496846-1260847899-3463414960-1318683051
	Account Name:		67FAE8CE-031B-4B27-B084-6FCEAB81994E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5ACC40
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17070 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1744496846-1260847899-3463414960-1318683051
	Account Name:		67FAE8CE-031B-4B27-B084-6FCEAB81994E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5ACC40
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17069 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		67FAE8CE-031B-4B27-B084-6FCEAB81994E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17068 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1744496846-1260847899-3463414960-1318683051
	Account Name:		67FAE8CE-031B-4B27-B084-6FCEAB81994E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5ACBF7
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17067 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:21 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1744496846-1260847899-3463414960-1318683051
	Account Name:		67FAE8CE-031B-4B27-B084-6FCEAB81994E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5ACBF7
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17066 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1744496846-1260847899-3463414960-1318683051
	Account Name:		67FAE8CE-031B-4B27-B084-6FCEAB81994E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5ACBF7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17065 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		67FAE8CE-031B-4B27-B084-6FCEAB81994E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17064 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1744496846-1260847899-3463414960-1318683051
	Account Name:		67FAE8CE-031B-4B27-B084-6FCEAB81994E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5ACB50
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17063 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1744496846-1260847899-3463414960-1318683051
	Account Name:		67FAE8CE-031B-4B27-B084-6FCEAB81994E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5ACB50
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17062 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		67FAE8CE-031B-4B27-B084-6FCEAB81994E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17061 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3035412289-1161896863-347919237-1735187853
	Account Name:		B4ECB741-239F-4541-85D3-BC148DDD6C67
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x594DCD
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17060 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:20 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1575259796-1242272869-1266881416-1006115058
	Account Name:		5DE48E94-9465-4A0B-8813-834BF218F83B
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5A76B7
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17059 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:13 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1575259796-1242272869-1266881416-1006115058
	Account Name:		5DE48E94-9465-4A0B-8813-834BF218F83B
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5A76B7
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17058 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:13 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1575259796-1242272869-1266881416-1006115058
	Account Name:		5DE48E94-9465-4A0B-8813-834BF218F83B
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5A76B7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17057 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:13 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		5DE48E94-9465-4A0B-8813-834BF218F83B
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17056 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:13 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1575259796-1242272869-1266881416-1006115058
	Account Name:		5DE48E94-9465-4A0B-8813-834BF218F83B
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5A4477
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17055 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:10 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1575259796-1242272869-1266881416-1006115058
	Account Name:		5DE48E94-9465-4A0B-8813-834BF218F83B
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5A4477
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17054 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1575259796-1242272869-1266881416-1006115058
	Account Name:		5DE48E94-9465-4A0B-8813-834BF218F83B
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5A4477
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17053 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		5DE48E94-9465-4A0B-8813-834BF218F83B
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17052 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1575259796-1242272869-1266881416-1006115058
	Account Name:		5DE48E94-9465-4A0B-8813-834BF218F83B
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5A3642
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17051 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:10 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1575259796-1242272869-1266881416-1006115058
	Account Name:		5DE48E94-9465-4A0B-8813-834BF218F83B
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5A378F
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17050 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1575259796-1242272869-1266881416-1006115058
	Account Name:		5DE48E94-9465-4A0B-8813-834BF218F83B
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5A378F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17049 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		5DE48E94-9465-4A0B-8813-834BF218F83B
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17048 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1575259796-1242272869-1266881416-1006115058
	Account Name:		5DE48E94-9465-4A0B-8813-834BF218F83B
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5A3736
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17047 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:09 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1575259796-1242272869-1266881416-1006115058
	Account Name:		5DE48E94-9465-4A0B-8813-834BF218F83B
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5A3736
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17046 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1575259796-1242272869-1266881416-1006115058
	Account Name:		5DE48E94-9465-4A0B-8813-834BF218F83B
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5A3736
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17045 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		5DE48E94-9465-4A0B-8813-834BF218F83B
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17044 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1575259796-1242272869-1266881416-1006115058
	Account Name:		5DE48E94-9465-4A0B-8813-834BF218F83B
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5A36ED
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17043 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:09 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1575259796-1242272869-1266881416-1006115058
	Account Name:		5DE48E94-9465-4A0B-8813-834BF218F83B
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5A36ED
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17042 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1575259796-1242272869-1266881416-1006115058
	Account Name:		5DE48E94-9465-4A0B-8813-834BF218F83B
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5A36ED
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17041 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		5DE48E94-9465-4A0B-8813-834BF218F83B
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17040 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1575259796-1242272869-1266881416-1006115058
	Account Name:		5DE48E94-9465-4A0B-8813-834BF218F83B
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5A3642
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17039 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1575259796-1242272869-1266881416-1006115058
	Account Name:		5DE48E94-9465-4A0B-8813-834BF218F83B
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5A3642
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17038 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		5DE48E94-9465-4A0B-8813-834BF218F83B
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17037 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:48:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-438732438-1232323054-634517181-3103172296
	Account Name:		1A268696-C1EE-4973-BDF6-D125C8A6F6B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x57DB6C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17036 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:47:57 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x594C05
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17035 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:47:37 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3035412289-1161896863-347919237-1735187853
	Account Name:		B4ECB741-239F-4541-85D3-BC148DDD6C67
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x598D79
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17034 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:47:29 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3035412289-1161896863-347919237-1735187853
	Account Name:		B4ECB741-239F-4541-85D3-BC148DDD6C67
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x598D79
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17033 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:47:29 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3035412289-1161896863-347919237-1735187853
	Account Name:		B4ECB741-239F-4541-85D3-BC148DDD6C67
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x598D79
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17032 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:47:29 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		B4ECB741-239F-4541-85D3-BC148DDD6C67
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17031 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:47:29 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3035412289-1161896863-347919237-1735187853
	Account Name:		B4ECB741-239F-4541-85D3-BC148DDD6C67
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x595B0A
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17030 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:47:25 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3035412289-1161896863-347919237-1735187853
	Account Name:		B4ECB741-239F-4541-85D3-BC148DDD6C67
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x595B0A
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17029 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:47:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3035412289-1161896863-347919237-1735187853
	Account Name:		B4ECB741-239F-4541-85D3-BC148DDD6C67
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x595B0A
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17028 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:47:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		B4ECB741-239F-4541-85D3-BC148DDD6C67
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17027 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:47:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3035412289-1161896863-347919237-1735187853
	Account Name:		B4ECB741-239F-4541-85D3-BC148DDD6C67
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x594C85
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17026 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:47:24 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3035412289-1161896863-347919237-1735187853
	Account Name:		B4ECB741-239F-4541-85D3-BC148DDD6C67
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x594DCD
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17025 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:47:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3035412289-1161896863-347919237-1735187853
	Account Name:		B4ECB741-239F-4541-85D3-BC148DDD6C67
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x594DCD
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17024 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:47:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		B4ECB741-239F-4541-85D3-BC148DDD6C67
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17023 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:47:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3035412289-1161896863-347919237-1735187853
	Account Name:		B4ECB741-239F-4541-85D3-BC148DDD6C67
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x594D74
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17022 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:47:24 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3035412289-1161896863-347919237-1735187853
	Account Name:		B4ECB741-239F-4541-85D3-BC148DDD6C67
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x594D74
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17021 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:47:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3035412289-1161896863-347919237-1735187853
	Account Name:		B4ECB741-239F-4541-85D3-BC148DDD6C67
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x594D74
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17020 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:47:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		B4ECB741-239F-4541-85D3-BC148DDD6C67
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17019 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:47:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3035412289-1161896863-347919237-1735187853
	Account Name:		B4ECB741-239F-4541-85D3-BC148DDD6C67
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x594D2B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17018 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:47:24 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3035412289-1161896863-347919237-1735187853
	Account Name:		B4ECB741-239F-4541-85D3-BC148DDD6C67
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x594D2B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17017 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:47:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3035412289-1161896863-347919237-1735187853
	Account Name:		B4ECB741-239F-4541-85D3-BC148DDD6C67
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x594D2B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17016 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:47:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		B4ECB741-239F-4541-85D3-BC148DDD6C67
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17015 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:47:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3035412289-1161896863-347919237-1735187853
	Account Name:		B4ECB741-239F-4541-85D3-BC148DDD6C67
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x594C85
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17014 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:47:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3035412289-1161896863-347919237-1735187853
	Account Name:		B4ECB741-239F-4541-85D3-BC148DDD6C67
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x594C85
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17013 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:47:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		B4ECB741-239F-4541-85D3-BC148DDD6C67
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17012 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:47:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x594C05
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52537
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17011 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:47:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x594C05
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17010 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:47:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x58DED7
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17009 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:47:08 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4140089076-1133322979-1006466734-4142176601
	Account Name:		F6C4BEF4-22E3-438D-AE76-FD3B5999E4F6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5858AA
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17008 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:47:07 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4140089076-1133322979-1006466734-4142176601
	Account Name:		F6C4BEF4-22E3-438D-AE76-FD3B5999E4F6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x590B0C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17007 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:56 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4140089076-1133322979-1006466734-4142176601
	Account Name:		F6C4BEF4-22E3-438D-AE76-FD3B5999E4F6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x590B0C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17006 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4140089076-1133322979-1006466734-4142176601
	Account Name:		F6C4BEF4-22E3-438D-AE76-FD3B5999E4F6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x590B0C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17005 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		F6C4BEF4-22E3-438D-AE76-FD3B5999E4F6
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 17004 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x58DED7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{07A26218-EC88-882C-1A5C-3DFA8432F918}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52532
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 17003 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x58DED7
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17002 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-438732438-1232323054-634517181-3103172296
	Account Name:		1A268696-C1EE-4973-BDF6-D125C8A6F6B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x58DAEB
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 17001 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:43 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-438732438-1232323054-634517181-3103172296
	Account Name:		1A268696-C1EE-4973-BDF6-D125C8A6F6B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x58DAEB
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 17000 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:43 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-438732438-1232323054-634517181-3103172296
	Account Name:		1A268696-C1EE-4973-BDF6-D125C8A6F6B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x58DAEB
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16999 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:43 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1A268696-C1EE-4973-BDF6-D125C8A6F6B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16998 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:43 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4140089076-1133322979-1006466734-4142176601
	Account Name:		F6C4BEF4-22E3-438D-AE76-FD3B5999E4F6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5899CF
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16997 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:07 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4140089076-1133322979-1006466734-4142176601
	Account Name:		F6C4BEF4-22E3-438D-AE76-FD3B5999E4F6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5899CF
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16996 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4140089076-1133322979-1006466734-4142176601
	Account Name:		F6C4BEF4-22E3-438D-AE76-FD3B5999E4F6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5899CF
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16995 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		F6C4BEF4-22E3-438D-AE76-FD3B5999E4F6
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16994 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4140089076-1133322979-1006466734-4142176601
	Account Name:		F6C4BEF4-22E3-438D-AE76-FD3B5999E4F6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5865BA
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16993 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:01 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4140089076-1133322979-1006466734-4142176601
	Account Name:		F6C4BEF4-22E3-438D-AE76-FD3B5999E4F6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5865BA
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16992 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4140089076-1133322979-1006466734-4142176601
	Account Name:		F6C4BEF4-22E3-438D-AE76-FD3B5999E4F6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5865BA
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16991 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		F6C4BEF4-22E3-438D-AE76-FD3B5999E4F6
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16990 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4140089076-1133322979-1006466734-4142176601
	Account Name:		F6C4BEF4-22E3-438D-AE76-FD3B5999E4F6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5856EB
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16989 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:01 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4140089076-1133322979-1006466734-4142176601
	Account Name:		F6C4BEF4-22E3-438D-AE76-FD3B5999E4F6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5858AA
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16988 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4140089076-1133322979-1006466734-4142176601
	Account Name:		F6C4BEF4-22E3-438D-AE76-FD3B5999E4F6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5858AA
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16987 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		F6C4BEF4-22E3-438D-AE76-FD3B5999E4F6
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16986 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4140089076-1133322979-1006466734-4142176601
	Account Name:		F6C4BEF4-22E3-438D-AE76-FD3B5999E4F6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x585851
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16985 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:00 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4140089076-1133322979-1006466734-4142176601
	Account Name:		F6C4BEF4-22E3-438D-AE76-FD3B5999E4F6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x585851
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16984 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4140089076-1133322979-1006466734-4142176601
	Account Name:		F6C4BEF4-22E3-438D-AE76-FD3B5999E4F6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x585851
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16983 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		F6C4BEF4-22E3-438D-AE76-FD3B5999E4F6
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16982 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4140089076-1133322979-1006466734-4142176601
	Account Name:		F6C4BEF4-22E3-438D-AE76-FD3B5999E4F6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x585808
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16981 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:00 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4140089076-1133322979-1006466734-4142176601
	Account Name:		F6C4BEF4-22E3-438D-AE76-FD3B5999E4F6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x585808
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16980 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4140089076-1133322979-1006466734-4142176601
	Account Name:		F6C4BEF4-22E3-438D-AE76-FD3B5999E4F6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x585808
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16979 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		F6C4BEF4-22E3-438D-AE76-FD3B5999E4F6
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16978 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4140089076-1133322979-1006466734-4142176601
	Account Name:		F6C4BEF4-22E3-438D-AE76-FD3B5999E4F6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5856EB
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16977 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4140089076-1133322979-1006466734-4142176601
	Account Name:		F6C4BEF4-22E3-438D-AE76-FD3B5999E4F6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x5856EB
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16976 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		F6C4BEF4-22E3-438D-AE76-FD3B5999E4F6
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16975 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:46:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-438732438-1232323054-634517181-3103172296
	Account Name:		1A268696-C1EE-4973-BDF6-D125C8A6F6B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x581C5D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16974 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:45:43 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-438732438-1232323054-634517181-3103172296
	Account Name:		1A268696-C1EE-4973-BDF6-D125C8A6F6B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x581C5D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16973 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:45:43 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-438732438-1232323054-634517181-3103172296
	Account Name:		1A268696-C1EE-4973-BDF6-D125C8A6F6B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x581C5D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16972 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:45:43 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1A268696-C1EE-4973-BDF6-D125C8A6F6B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16971 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:45:43 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x57C7A6
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16970 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:45:37 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-438732438-1232323054-634517181-3103172296
	Account Name:		1A268696-C1EE-4973-BDF6-D125C8A6F6B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x57E89C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16969 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:45:37 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-438732438-1232323054-634517181-3103172296
	Account Name:		1A268696-C1EE-4973-BDF6-D125C8A6F6B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x57E89C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16968 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:45:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-438732438-1232323054-634517181-3103172296
	Account Name:		1A268696-C1EE-4973-BDF6-D125C8A6F6B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x57E89C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16967 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:45:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1A268696-C1EE-4973-BDF6-D125C8A6F6B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16966 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:45:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-438732438-1232323054-634517181-3103172296
	Account Name:		1A268696-C1EE-4973-BDF6-D125C8A6F6B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x57DA25
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16965 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:45:37 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-438732438-1232323054-634517181-3103172296
	Account Name:		1A268696-C1EE-4973-BDF6-D125C8A6F6B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x57DB6C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16964 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:45:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-438732438-1232323054-634517181-3103172296
	Account Name:		1A268696-C1EE-4973-BDF6-D125C8A6F6B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x57DB6C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16963 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:45:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1A268696-C1EE-4973-BDF6-D125C8A6F6B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16962 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:45:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-438732438-1232323054-634517181-3103172296
	Account Name:		1A268696-C1EE-4973-BDF6-D125C8A6F6B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x57DB13
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16961 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:45:37 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-438732438-1232323054-634517181-3103172296
	Account Name:		1A268696-C1EE-4973-BDF6-D125C8A6F6B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x57DB13
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16960 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:45:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-438732438-1232323054-634517181-3103172296
	Account Name:		1A268696-C1EE-4973-BDF6-D125C8A6F6B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x57DB13
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16959 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:45:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1A268696-C1EE-4973-BDF6-D125C8A6F6B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16958 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:45:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-438732438-1232323054-634517181-3103172296
	Account Name:		1A268696-C1EE-4973-BDF6-D125C8A6F6B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x57DACA
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16957 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:45:37 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-438732438-1232323054-634517181-3103172296
	Account Name:		1A268696-C1EE-4973-BDF6-D125C8A6F6B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x57DACA
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16956 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:45:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-438732438-1232323054-634517181-3103172296
	Account Name:		1A268696-C1EE-4973-BDF6-D125C8A6F6B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x57DACA
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16955 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:45:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1A268696-C1EE-4973-BDF6-D125C8A6F6B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16954 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:45:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-438732438-1232323054-634517181-3103172296
	Account Name:		1A268696-C1EE-4973-BDF6-D125C8A6F6B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x57DA25
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16953 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:45:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-438732438-1232323054-634517181-3103172296
	Account Name:		1A268696-C1EE-4973-BDF6-D125C8A6F6B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x57DA25
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16952 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:45:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1A268696-C1EE-4973-BDF6-D125C8A6F6B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16951 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:45:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x57C7A6
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52519
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16950 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:45:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x57C7A6
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16949 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:45:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x55B561
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16948 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:45:00 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2795515701-1212785423-677304760-356663779
	Account Name:		A6A02F35-A30F-4849-B8D9-5E28E3414215
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x55BAC9
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16947 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:55 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2795515701-1212785423-677304760-356663779
	Account Name:		A6A02F35-A30F-4849-B8D9-5E28E3414215
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x55DA1D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16946 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:49 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2795515701-1212785423-677304760-356663779
	Account Name:		A6A02F35-A30F-4849-B8D9-5E28E3414215
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x55DA1D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16945 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2795515701-1212785423-677304760-356663779
	Account Name:		A6A02F35-A30F-4849-B8D9-5E28E3414215
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x55DA1D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16944 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		A6A02F35-A30F-4849-B8D9-5E28E3414215
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16943 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2795515701-1212785423-677304760-356663779
	Account Name:		A6A02F35-A30F-4849-B8D9-5E28E3414215
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x55C82F
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16942 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:49 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2795515701-1212785423-677304760-356663779
	Account Name:		A6A02F35-A30F-4849-B8D9-5E28E3414215
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x55C82F
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16941 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2795515701-1212785423-677304760-356663779
	Account Name:		A6A02F35-A30F-4849-B8D9-5E28E3414215
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x55C82F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16940 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		A6A02F35-A30F-4849-B8D9-5E28E3414215
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16939 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2795515701-1212785423-677304760-356663779
	Account Name:		A6A02F35-A30F-4849-B8D9-5E28E3414215
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x55B981
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16938 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:49 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2795515701-1212785423-677304760-356663779
	Account Name:		A6A02F35-A30F-4849-B8D9-5E28E3414215
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x55BAC9
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16937 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2795515701-1212785423-677304760-356663779
	Account Name:		A6A02F35-A30F-4849-B8D9-5E28E3414215
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x55BAC9
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16936 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		A6A02F35-A30F-4849-B8D9-5E28E3414215
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16935 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2795515701-1212785423-677304760-356663779
	Account Name:		A6A02F35-A30F-4849-B8D9-5E28E3414215
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x55BA70
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16934 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:49 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2795515701-1212785423-677304760-356663779
	Account Name:		A6A02F35-A30F-4849-B8D9-5E28E3414215
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x55BA70
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16933 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2795515701-1212785423-677304760-356663779
	Account Name:		A6A02F35-A30F-4849-B8D9-5E28E3414215
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x55BA70
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16932 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		A6A02F35-A30F-4849-B8D9-5E28E3414215
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16931 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2795515701-1212785423-677304760-356663779
	Account Name:		A6A02F35-A30F-4849-B8D9-5E28E3414215
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x55BA27
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16930 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:48 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2795515701-1212785423-677304760-356663779
	Account Name:		A6A02F35-A30F-4849-B8D9-5E28E3414215
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x55BA27
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16929 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:48 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2795515701-1212785423-677304760-356663779
	Account Name:		A6A02F35-A30F-4849-B8D9-5E28E3414215
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x55BA27
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16928 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:48 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		A6A02F35-A30F-4849-B8D9-5E28E3414215
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16927 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:48 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2795515701-1212785423-677304760-356663779
	Account Name:		A6A02F35-A30F-4849-B8D9-5E28E3414215
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x55B981
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16926 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:48 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2795515701-1212785423-677304760-356663779
	Account Name:		A6A02F35-A30F-4849-B8D9-5E28E3414215
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x55B981
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16925 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:48 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		A6A02F35-A30F-4849-B8D9-5E28E3414215
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16924 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:48 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x55B606
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16923 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:44 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x55B5F4
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16922 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:44 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x55B5F3
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16921 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:44 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x55B5F4
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	CHH2-832929-1
	Source Network Address:	10.222.0.15
	Source Port:		52512
Detailed Authentication Information:
	Logon Process:		NtLmSsp 
	Authentication Package:	NTLM
	Transited Services:	-
	Package Name (NTLM only):	NTLM V2
	Key Length:		128
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16920 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x55B5F4
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16919 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x55B606
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	CHH2-832929-1
	Source Network Address:	10.222.0.15
	Source Port:		52513
Detailed Authentication Information:
	Logon Process:		NtLmSsp 
	Authentication Package:	NTLM
	Transited Services:	-
	Package Name (NTLM only):	NTLM V2
	Key Length:		128
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16918 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x55B606
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16917 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x55B5F3
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	CHH2-832929-1
	Source Network Address:	10.222.0.15
	Source Port:		52511
Detailed Authentication Information:
	Logon Process:		NtLmSsp 
	Authentication Package:	NTLM
	Transited Services:	-
	Package Name (NTLM only):	NTLM V2
	Key Length:		128
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16916 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x55B5F3
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16915 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x55B561
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	CHH2-832929-1
	Source Network Address:	10.222.0.15
	Source Port:		52510
Detailed Authentication Information:
	Logon Process:		NtLmSsp 
	Authentication Package:	NTLM
	Transited Services:	-
	Package Name (NTLM only):	NTLM V2
	Key Length:		128
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16914 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x55B561
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16913 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3720302910-1338459425-232900525-202911144
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x517FDA
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16912 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:35 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3720302910-1338459425-232900525-202911144
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x545373
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16911 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:06 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3720302910-1338459425-232900525-202911144
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x545373
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16910 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:06 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3720302910-1338459425-232900525-202911144
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x545373
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16909 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:06 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16908 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:44:06 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3667171687-1232258649-2188638612-572236016
	Account Name:		DA949967-C659-4972-94F9-7382F0A01B22
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x527BFE
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16907 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:56 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3667171687-1232258649-2188638612-572236016
	Account Name:		DA949967-C659-4972-94F9-7382F0A01B22
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x537393
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16906 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:52 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3667171687-1232258649-2188638612-572236016
	Account Name:		DA949967-C659-4972-94F9-7382F0A01B22
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x537393
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16905 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:52 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3667171687-1232258649-2188638612-572236016
	Account Name:		DA949967-C659-4972-94F9-7382F0A01B22
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x537393
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16904 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:52 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DA949967-C659-4972-94F9-7382F0A01B22
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16903 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:52 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3667171687-1232258649-2188638612-572236016
	Account Name:		DA949967-C659-4972-94F9-7382F0A01B22
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x533ABA
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16902 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:45 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3667171687-1232258649-2188638612-572236016
	Account Name:		DA949967-C659-4972-94F9-7382F0A01B22
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x533ABA
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16901 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3667171687-1232258649-2188638612-572236016
	Account Name:		DA949967-C659-4972-94F9-7382F0A01B22
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x533ABA
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16900 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DA949967-C659-4972-94F9-7382F0A01B22
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16899 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16898 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16897 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3667171687-1232258649-2188638612-572236016
	Account Name:		DA949967-C659-4972-94F9-7382F0A01B22
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x527AA3
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16896 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:40 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3667171687-1232258649-2188638612-572236016
	Account Name:		DA949967-C659-4972-94F9-7382F0A01B22
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x527BFE
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16895 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3667171687-1232258649-2188638612-572236016
	Account Name:		DA949967-C659-4972-94F9-7382F0A01B22
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x527BFE
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16894 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DA949967-C659-4972-94F9-7382F0A01B22
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16893 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3667171687-1232258649-2188638612-572236016
	Account Name:		DA949967-C659-4972-94F9-7382F0A01B22
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x527BA5
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16892 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:40 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3667171687-1232258649-2188638612-572236016
	Account Name:		DA949967-C659-4972-94F9-7382F0A01B22
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x527BA5
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16891 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3667171687-1232258649-2188638612-572236016
	Account Name:		DA949967-C659-4972-94F9-7382F0A01B22
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x527BA5
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16890 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DA949967-C659-4972-94F9-7382F0A01B22
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16889 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3667171687-1232258649-2188638612-572236016
	Account Name:		DA949967-C659-4972-94F9-7382F0A01B22
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x527B5B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16888 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:40 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3667171687-1232258649-2188638612-572236016
	Account Name:		DA949967-C659-4972-94F9-7382F0A01B22
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x527B5B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16887 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3667171687-1232258649-2188638612-572236016
	Account Name:		DA949967-C659-4972-94F9-7382F0A01B22
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x527B5B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16886 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DA949967-C659-4972-94F9-7382F0A01B22
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16885 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3667171687-1232258649-2188638612-572236016
	Account Name:		DA949967-C659-4972-94F9-7382F0A01B22
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x527AA3
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16884 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3667171687-1232258649-2188638612-572236016
	Account Name:		DA949967-C659-4972-94F9-7382F0A01B22
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x527AA3
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16883 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DA949967-C659-4972-94F9-7382F0A01B22
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16882 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3720302910-1338459425-232900525-202911144
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x52774D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16881 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:39 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3720302910-1338459425-232900525-202911144
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x52774D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16880 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3720302910-1338459425-232900525-202911144
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x52774D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16879 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16878 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x5255F6
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16877 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:32 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x5255F6
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52503
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16876 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x5255F6
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16875 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:43:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-756985936-1262498811-399767175-2649460202
	Account Name:		2D1EB050-33FB-4B40-87F6-D317EA8DEB9D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x50F018
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16874 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:42:37 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3720302910-1338459425-232900525-202911144
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x51CB01
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16873 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:42:32 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3720302910-1338459425-232900525-202911144
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x51CB01
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16872 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:42:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3720302910-1338459425-232900525-202911144
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x51CB01
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16871 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:42:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16870 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:42:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3720302910-1338459425-232900525-202911144
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x518CD4
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16869 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:42:26 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3720302910-1338459425-232900525-202911144
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x518CD4
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16868 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:42:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3720302910-1338459425-232900525-202911144
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x518CD4
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16867 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:42:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16866 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:42:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3720302910-1338459425-232900525-202911144
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x517E8B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16865 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:42:26 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3720302910-1338459425-232900525-202911144
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x517FDA
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16864 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:42:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3720302910-1338459425-232900525-202911144
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x517FDA
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16863 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:42:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16862 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:42:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3720302910-1338459425-232900525-202911144
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x517F81
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16861 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:42:26 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3720302910-1338459425-232900525-202911144
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x517F81
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16860 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:42:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3720302910-1338459425-232900525-202911144
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x517F81
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16859 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:42:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16858 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:42:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3720302910-1338459425-232900525-202911144
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x517F30
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16857 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:42:26 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3720302910-1338459425-232900525-202911144
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x517F30
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16856 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:42:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3720302910-1338459425-232900525-202911144
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x517F30
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16855 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:42:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16854 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:42:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3720302910-1338459425-232900525-202911144
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x517E8B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16853 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:42:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3720302910-1338459425-232900525-202911144
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x517E8B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16852 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:42:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DDBF513E-4521-4FC7-ADC7-E10DA82D180C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16851 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:42:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-756985936-1262498811-399767175-2649460202
	Account Name:		2D1EB050-33FB-4B40-87F6-D317EA8DEB9D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x512F6D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16850 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:41:37 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-756985936-1262498811-399767175-2649460202
	Account Name:		2D1EB050-33FB-4B40-87F6-D317EA8DEB9D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x512F6D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16849 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:41:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-756985936-1262498811-399767175-2649460202
	Account Name:		2D1EB050-33FB-4B40-87F6-D317EA8DEB9D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x512F6D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16848 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:41:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		2D1EB050-33FB-4B40-87F6-D317EA8DEB9D
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16847 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:41:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-756985936-1262498811-399767175-2649460202
	Account Name:		2D1EB050-33FB-4B40-87F6-D317EA8DEB9D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x50FD73
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16846 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:41:33 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-756985936-1262498811-399767175-2649460202
	Account Name:		2D1EB050-33FB-4B40-87F6-D317EA8DEB9D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x50FD73
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16845 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:41:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-756985936-1262498811-399767175-2649460202
	Account Name:		2D1EB050-33FB-4B40-87F6-D317EA8DEB9D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x50FD73
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16844 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:41:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		2D1EB050-33FB-4B40-87F6-D317EA8DEB9D
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16843 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:41:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-756985936-1262498811-399767175-2649460202
	Account Name:		2D1EB050-33FB-4B40-87F6-D317EA8DEB9D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x50EECC
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16842 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:41:32 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x50DC8C
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16841 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:41:32 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-756985936-1262498811-399767175-2649460202
	Account Name:		2D1EB050-33FB-4B40-87F6-D317EA8DEB9D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x50F018
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16840 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:41:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-756985936-1262498811-399767175-2649460202
	Account Name:		2D1EB050-33FB-4B40-87F6-D317EA8DEB9D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x50F018
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16839 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:41:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		2D1EB050-33FB-4B40-87F6-D317EA8DEB9D
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16838 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:41:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-756985936-1262498811-399767175-2649460202
	Account Name:		2D1EB050-33FB-4B40-87F6-D317EA8DEB9D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x50EFBF
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16837 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:41:32 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-756985936-1262498811-399767175-2649460202
	Account Name:		2D1EB050-33FB-4B40-87F6-D317EA8DEB9D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x50EFBF
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16836 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:41:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-756985936-1262498811-399767175-2649460202
	Account Name:		2D1EB050-33FB-4B40-87F6-D317EA8DEB9D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x50EFBF
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16835 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:41:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		2D1EB050-33FB-4B40-87F6-D317EA8DEB9D
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16834 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:41:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-756985936-1262498811-399767175-2649460202
	Account Name:		2D1EB050-33FB-4B40-87F6-D317EA8DEB9D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x50EF76
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16833 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:41:32 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-756985936-1262498811-399767175-2649460202
	Account Name:		2D1EB050-33FB-4B40-87F6-D317EA8DEB9D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x50EF76
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16832 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:41:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-756985936-1262498811-399767175-2649460202
	Account Name:		2D1EB050-33FB-4B40-87F6-D317EA8DEB9D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x50EF76
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16831 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:41:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		2D1EB050-33FB-4B40-87F6-D317EA8DEB9D
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16830 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:41:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-756985936-1262498811-399767175-2649460202
	Account Name:		2D1EB050-33FB-4B40-87F6-D317EA8DEB9D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x50EECC
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16829 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:41:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-756985936-1262498811-399767175-2649460202
	Account Name:		2D1EB050-33FB-4B40-87F6-D317EA8DEB9D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x50EECC
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16828 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:41:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		2D1EB050-33FB-4B40-87F6-D317EA8DEB9D
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16827 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:41:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x50DC8C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52486
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16826 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:41:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x50DC8C
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16825 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:41:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-248108086-1082766299-77717403-69819259
	Account Name:		0EC9D436-B3DB-4089-9BDF-A1047B5B2904
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4C53DE
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16824 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:41:03 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-852999144-1124317578-3003647908-1321987229
	Account Name:		32D7BBE8-B98A-4303-A407-08B39DECCB4E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4FB7D8
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16823 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:40:18 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-852999144-1124317578-3003647908-1321987229
	Account Name:		32D7BBE8-B98A-4303-A407-08B39DECCB4E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x500DE5
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16822 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:40:11 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-852999144-1124317578-3003647908-1321987229
	Account Name:		32D7BBE8-B98A-4303-A407-08B39DECCB4E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x500DE5
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16821 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:40:11 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-852999144-1124317578-3003647908-1321987229
	Account Name:		32D7BBE8-B98A-4303-A407-08B39DECCB4E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x500DE5
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16820 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:40:11 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		32D7BBE8-B98A-4303-A407-08B39DECCB4E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16819 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:40:11 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-852999144-1124317578-3003647908-1321987229
	Account Name:		32D7BBE8-B98A-4303-A407-08B39DECCB4E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4FD8E8
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16818 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:40:06 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-852999144-1124317578-3003647908-1321987229
	Account Name:		32D7BBE8-B98A-4303-A407-08B39DECCB4E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4FD8E8
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16817 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:40:06 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-852999144-1124317578-3003647908-1321987229
	Account Name:		32D7BBE8-B98A-4303-A407-08B39DECCB4E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4FD8E8
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16816 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:40:06 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		32D7BBE8-B98A-4303-A407-08B39DECCB4E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16815 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:40:06 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-852999144-1124317578-3003647908-1321987229
	Account Name:		32D7BBE8-B98A-4303-A407-08B39DECCB4E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4FB678
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16814 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:40:01 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-852999144-1124317578-3003647908-1321987229
	Account Name:		32D7BBE8-B98A-4303-A407-08B39DECCB4E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4FB7D8
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16813 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:40:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-852999144-1124317578-3003647908-1321987229
	Account Name:		32D7BBE8-B98A-4303-A407-08B39DECCB4E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4FB7D8
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16812 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:40:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		32D7BBE8-B98A-4303-A407-08B39DECCB4E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16811 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:40:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-852999144-1124317578-3003647908-1321987229
	Account Name:		32D7BBE8-B98A-4303-A407-08B39DECCB4E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4FB77F
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16810 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:40:00 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-852999144-1124317578-3003647908-1321987229
	Account Name:		32D7BBE8-B98A-4303-A407-08B39DECCB4E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4FB77F
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16809 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:40:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-852999144-1124317578-3003647908-1321987229
	Account Name:		32D7BBE8-B98A-4303-A407-08B39DECCB4E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4FB77F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16808 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:40:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		32D7BBE8-B98A-4303-A407-08B39DECCB4E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16807 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:40:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-852999144-1124317578-3003647908-1321987229
	Account Name:		32D7BBE8-B98A-4303-A407-08B39DECCB4E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4FB735
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16806 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:40:00 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-852999144-1124317578-3003647908-1321987229
	Account Name:		32D7BBE8-B98A-4303-A407-08B39DECCB4E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4FB735
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16805 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:40:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-852999144-1124317578-3003647908-1321987229
	Account Name:		32D7BBE8-B98A-4303-A407-08B39DECCB4E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4FB735
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16804 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:40:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		32D7BBE8-B98A-4303-A407-08B39DECCB4E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16803 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:40:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-852999144-1124317578-3003647908-1321987229
	Account Name:		32D7BBE8-B98A-4303-A407-08B39DECCB4E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4FB678
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16802 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:40:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-852999144-1124317578-3003647908-1321987229
	Account Name:		32D7BBE8-B98A-4303-A407-08B39DECCB4E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4FB678
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16801 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:40:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		32D7BBE8-B98A-4303-A407-08B39DECCB4E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16800 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:40:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x4F8CEC
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16799 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:39:32 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x4F8CEC
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52471
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16798 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:39:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x4F8CEC
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16797 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:39:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1992770808-1209568906-3316911759-843085561
	Account Name:		76C744F8-8E8A-4818-8F0E-B4C5F9764032
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4DE304
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16796 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:38:40 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1992770808-1209568906-3316911759-843085561
	Account Name:		76C744F8-8E8A-4818-8F0E-B4C5F9764032
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4ED37F
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16795 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:49 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1992770808-1209568906-3316911759-843085561
	Account Name:		76C744F8-8E8A-4818-8F0E-B4C5F9764032
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4ED37F
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16794 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1992770808-1209568906-3316911759-843085561
	Account Name:		76C744F8-8E8A-4818-8F0E-B4C5F9764032
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4ED37F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16793 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		76C744F8-8E8A-4818-8F0E-B4C5F9764032
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16792 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x4E1B22
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16791 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:32 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3393556782-1209102961-998002613-4155121456
	Account Name:		CA45912E-7271-4811-B54F-7C3B301FAAF7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4DC6DD
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16790 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:28 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1992770808-1209568906-3316911759-843085561
	Account Name:		76C744F8-8E8A-4818-8F0E-B4C5F9764032
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4E5D80
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16789 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:23 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1992770808-1209568906-3316911759-843085561
	Account Name:		76C744F8-8E8A-4818-8F0E-B4C5F9764032
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4E5D80
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16788 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1992770808-1209568906-3316911759-843085561
	Account Name:		76C744F8-8E8A-4818-8F0E-B4C5F9764032
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4E5D80
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16787 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		76C744F8-8E8A-4818-8F0E-B4C5F9764032
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16786 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3393556782-1209102961-998002613-4155121456
	Account Name:		CA45912E-7271-4811-B54F-7C3B301FAAF7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4E356B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16785 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:20 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3393556782-1209102961-998002613-4155121456
	Account Name:		CA45912E-7271-4811-B54F-7C3B301FAAF7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4E356B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16784 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3393556782-1209102961-998002613-4155121456
	Account Name:		CA45912E-7271-4811-B54F-7C3B301FAAF7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4E356B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16783 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		CA45912E-7271-4811-B54F-7C3B301FAAF7
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16782 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x4E1B22
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52461
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16781 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:19 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x4E1B22
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16780 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:19 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1992770808-1209568906-3316911759-843085561
	Account Name:		76C744F8-8E8A-4818-8F0E-B4C5F9764032
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4DFA59
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16779 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:16 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1992770808-1209568906-3316911759-843085561
	Account Name:		76C744F8-8E8A-4818-8F0E-B4C5F9764032
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4DFA59
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16778 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1992770808-1209568906-3316911759-843085561
	Account Name:		76C744F8-8E8A-4818-8F0E-B4C5F9764032
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4DFA59
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16777 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		76C744F8-8E8A-4818-8F0E-B4C5F9764032
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16776 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1992770808-1209568906-3316911759-843085561
	Account Name:		76C744F8-8E8A-4818-8F0E-B4C5F9764032
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4DE1B9
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16775 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:16 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1992770808-1209568906-3316911759-843085561
	Account Name:		76C744F8-8E8A-4818-8F0E-B4C5F9764032
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4DE304
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16774 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1992770808-1209568906-3316911759-843085561
	Account Name:		76C744F8-8E8A-4818-8F0E-B4C5F9764032
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4DE304
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16773 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		76C744F8-8E8A-4818-8F0E-B4C5F9764032
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16772 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1992770808-1209568906-3316911759-843085561
	Account Name:		76C744F8-8E8A-4818-8F0E-B4C5F9764032
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4DE2AB
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16771 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:16 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1992770808-1209568906-3316911759-843085561
	Account Name:		76C744F8-8E8A-4818-8F0E-B4C5F9764032
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4DE2AB
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16770 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1992770808-1209568906-3316911759-843085561
	Account Name:		76C744F8-8E8A-4818-8F0E-B4C5F9764032
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4DE2AB
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16769 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		76C744F8-8E8A-4818-8F0E-B4C5F9764032
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16768 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1992770808-1209568906-3316911759-843085561
	Account Name:		76C744F8-8E8A-4818-8F0E-B4C5F9764032
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4DE262
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16767 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:16 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1992770808-1209568906-3316911759-843085561
	Account Name:		76C744F8-8E8A-4818-8F0E-B4C5F9764032
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4DE262
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16766 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1992770808-1209568906-3316911759-843085561
	Account Name:		76C744F8-8E8A-4818-8F0E-B4C5F9764032
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4DE262
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16765 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		76C744F8-8E8A-4818-8F0E-B4C5F9764032
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16764 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1992770808-1209568906-3316911759-843085561
	Account Name:		76C744F8-8E8A-4818-8F0E-B4C5F9764032
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4DE1B9
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16763 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1992770808-1209568906-3316911759-843085561
	Account Name:		76C744F8-8E8A-4818-8F0E-B4C5F9764032
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4DE1B9
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16762 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		76C744F8-8E8A-4818-8F0E-B4C5F9764032
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16761 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3393556782-1209102961-998002613-4155121456
	Account Name:		CA45912E-7271-4811-B54F-7C3B301FAAF7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4DD3E2
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16760 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:14 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3393556782-1209102961-998002613-4155121456
	Account Name:		CA45912E-7271-4811-B54F-7C3B301FAAF7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4DD3E2
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16759 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3393556782-1209102961-998002613-4155121456
	Account Name:		CA45912E-7271-4811-B54F-7C3B301FAAF7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4DD3E2
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16758 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		CA45912E-7271-4811-B54F-7C3B301FAAF7
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16757 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3393556782-1209102961-998002613-4155121456
	Account Name:		CA45912E-7271-4811-B54F-7C3B301FAAF7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4DC58D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16756 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:13 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3393556782-1209102961-998002613-4155121456
	Account Name:		CA45912E-7271-4811-B54F-7C3B301FAAF7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4DC6DD
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16755 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:13 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3393556782-1209102961-998002613-4155121456
	Account Name:		CA45912E-7271-4811-B54F-7C3B301FAAF7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4DC6DD
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16754 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:13 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		CA45912E-7271-4811-B54F-7C3B301FAAF7
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16753 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:13 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3393556782-1209102961-998002613-4155121456
	Account Name:		CA45912E-7271-4811-B54F-7C3B301FAAF7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4DC684
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16752 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:13 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3393556782-1209102961-998002613-4155121456
	Account Name:		CA45912E-7271-4811-B54F-7C3B301FAAF7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4DC684
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16751 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:13 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3393556782-1209102961-998002613-4155121456
	Account Name:		CA45912E-7271-4811-B54F-7C3B301FAAF7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4DC684
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16750 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:13 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		CA45912E-7271-4811-B54F-7C3B301FAAF7
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16749 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:13 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3393556782-1209102961-998002613-4155121456
	Account Name:		CA45912E-7271-4811-B54F-7C3B301FAAF7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4DC637
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16748 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:13 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3393556782-1209102961-998002613-4155121456
	Account Name:		CA45912E-7271-4811-B54F-7C3B301FAAF7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4DC637
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16747 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:13 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3393556782-1209102961-998002613-4155121456
	Account Name:		CA45912E-7271-4811-B54F-7C3B301FAAF7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4DC637
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16746 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:13 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		CA45912E-7271-4811-B54F-7C3B301FAAF7
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16745 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:13 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3393556782-1209102961-998002613-4155121456
	Account Name:		CA45912E-7271-4811-B54F-7C3B301FAAF7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4DC58D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16744 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:13 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3393556782-1209102961-998002613-4155121456
	Account Name:		CA45912E-7271-4811-B54F-7C3B301FAAF7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4DC58D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16743 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:13 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		CA45912E-7271-4811-B54F-7C3B301FAAF7
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16742 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:37:13 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-545601557-1164083545-726843789-3758914317
	Account Name:		20853815-8159-4562-8DC1-522B0D7B0CE0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4B1360
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16741 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:33 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2368236304-1155152293-896574907-1446742320
	Account Name:		8D286B10-39A5-44DA-BBA5-703530893B56
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4C6F41
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16740 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:21 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2368236304-1155152293-896574907-1446742320
	Account Name:		8D286B10-39A5-44DA-BBA5-703530893B56
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4CE8D3
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16739 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:15 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2368236304-1155152293-896574907-1446742320
	Account Name:		8D286B10-39A5-44DA-BBA5-703530893B56
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4CE8D3
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16738 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:15 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2368236304-1155152293-896574907-1446742320
	Account Name:		8D286B10-39A5-44DA-BBA5-703530893B56
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4CE8D3
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16737 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:15 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		8D286B10-39A5-44DA-BBA5-703530893B56
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16736 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:15 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-248108086-1082766299-77717403-69819259
	Account Name:		0EC9D436-B3DB-4089-9BDF-A1047B5B2904
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4CC170
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16735 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:13 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-248108086-1082766299-77717403-69819259
	Account Name:		0EC9D436-B3DB-4089-9BDF-A1047B5B2904
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4CC170
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16734 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:13 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-248108086-1082766299-77717403-69819259
	Account Name:		0EC9D436-B3DB-4089-9BDF-A1047B5B2904
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4CC170
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16733 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:13 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		0EC9D436-B3DB-4089-9BDF-A1047B5B2904
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16732 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:13 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2368236304-1155152293-896574907-1446742320
	Account Name:		8D286B10-39A5-44DA-BBA5-703530893B56
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4C7CE7
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16731 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:09 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2368236304-1155152293-896574907-1446742320
	Account Name:		8D286B10-39A5-44DA-BBA5-703530893B56
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4C7CE7
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16730 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2368236304-1155152293-896574907-1446742320
	Account Name:		8D286B10-39A5-44DA-BBA5-703530893B56
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4C7CE7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16729 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		8D286B10-39A5-44DA-BBA5-703530893B56
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16728 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2368236304-1155152293-896574907-1446742320
	Account Name:		8D286B10-39A5-44DA-BBA5-703530893B56
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4C6DF6
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16727 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:09 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2368236304-1155152293-896574907-1446742320
	Account Name:		8D286B10-39A5-44DA-BBA5-703530893B56
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4C6F41
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16726 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2368236304-1155152293-896574907-1446742320
	Account Name:		8D286B10-39A5-44DA-BBA5-703530893B56
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4C6F41
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16725 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		8D286B10-39A5-44DA-BBA5-703530893B56
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16724 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2368236304-1155152293-896574907-1446742320
	Account Name:		8D286B10-39A5-44DA-BBA5-703530893B56
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4C6EE8
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16723 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:09 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2368236304-1155152293-896574907-1446742320
	Account Name:		8D286B10-39A5-44DA-BBA5-703530893B56
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4C6EE8
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16722 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2368236304-1155152293-896574907-1446742320
	Account Name:		8D286B10-39A5-44DA-BBA5-703530893B56
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4C6EE8
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16721 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		8D286B10-39A5-44DA-BBA5-703530893B56
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16720 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2368236304-1155152293-896574907-1446742320
	Account Name:		8D286B10-39A5-44DA-BBA5-703530893B56
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4C6E9F
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16719 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:09 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2368236304-1155152293-896574907-1446742320
	Account Name:		8D286B10-39A5-44DA-BBA5-703530893B56
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4C6E9F
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16718 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2368236304-1155152293-896574907-1446742320
	Account Name:		8D286B10-39A5-44DA-BBA5-703530893B56
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4C6E9F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16717 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		8D286B10-39A5-44DA-BBA5-703530893B56
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16716 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2368236304-1155152293-896574907-1446742320
	Account Name:		8D286B10-39A5-44DA-BBA5-703530893B56
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4C6DF6
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16715 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2368236304-1155152293-896574907-1446742320
	Account Name:		8D286B10-39A5-44DA-BBA5-703530893B56
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4C6DF6
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16714 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		8D286B10-39A5-44DA-BBA5-703530893B56
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16713 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-248108086-1082766299-77717403-69819259
	Account Name:		0EC9D436-B3DB-4089-9BDF-A1047B5B2904
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4C6150
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16712 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:08 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-248108086-1082766299-77717403-69819259
	Account Name:		0EC9D436-B3DB-4089-9BDF-A1047B5B2904
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4C6150
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16711 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-248108086-1082766299-77717403-69819259
	Account Name:		0EC9D436-B3DB-4089-9BDF-A1047B5B2904
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4C6150
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16710 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		0EC9D436-B3DB-4089-9BDF-A1047B5B2904
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16709 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-248108086-1082766299-77717403-69819259
	Account Name:		0EC9D436-B3DB-4089-9BDF-A1047B5B2904
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4C528B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16708 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:07 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-248108086-1082766299-77717403-69819259
	Account Name:		0EC9D436-B3DB-4089-9BDF-A1047B5B2904
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4C53DE
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16707 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-248108086-1082766299-77717403-69819259
	Account Name:		0EC9D436-B3DB-4089-9BDF-A1047B5B2904
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4C53DE
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16706 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		0EC9D436-B3DB-4089-9BDF-A1047B5B2904
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16705 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-248108086-1082766299-77717403-69819259
	Account Name:		0EC9D436-B3DB-4089-9BDF-A1047B5B2904
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4C537D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16704 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:07 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-248108086-1082766299-77717403-69819259
	Account Name:		0EC9D436-B3DB-4089-9BDF-A1047B5B2904
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4C537D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16703 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-248108086-1082766299-77717403-69819259
	Account Name:		0EC9D436-B3DB-4089-9BDF-A1047B5B2904
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4C537D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16702 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		0EC9D436-B3DB-4089-9BDF-A1047B5B2904
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16701 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-248108086-1082766299-77717403-69819259
	Account Name:		0EC9D436-B3DB-4089-9BDF-A1047B5B2904
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4C5334
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16700 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:07 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-248108086-1082766299-77717403-69819259
	Account Name:		0EC9D436-B3DB-4089-9BDF-A1047B5B2904
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4C5334
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16699 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-248108086-1082766299-77717403-69819259
	Account Name:		0EC9D436-B3DB-4089-9BDF-A1047B5B2904
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4C5334
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16698 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		0EC9D436-B3DB-4089-9BDF-A1047B5B2904
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16697 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-248108086-1082766299-77717403-69819259
	Account Name:		0EC9D436-B3DB-4089-9BDF-A1047B5B2904
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4C528B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16696 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-248108086-1082766299-77717403-69819259
	Account Name:		0EC9D436-B3DB-4089-9BDF-A1047B5B2904
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4C528B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16695 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		0EC9D436-B3DB-4089-9BDF-A1047B5B2904
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16694 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:36:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3020267373-1215779965-1558914982-2054650539
	Account Name:		B4059F6D-547D-4877-A627-EB5CAB7A777A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4AF106
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16693 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:42 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-545601557-1164083545-726843789-3758914317
	Account Name:		20853815-8159-4562-8DC1-522B0D7B0CE0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4B9854
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16692 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:36 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-545601557-1164083545-726843789-3758914317
	Account Name:		20853815-8159-4562-8DC1-522B0D7B0CE0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4B9854
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16691 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-545601557-1164083545-726843789-3758914317
	Account Name:		20853815-8159-4562-8DC1-522B0D7B0CE0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4B9854
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16690 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		20853815-8159-4562-8DC1-522B0D7B0CE0
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16689 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3020267373-1215779965-1558914982-2054650539
	Account Name:		B4059F6D-547D-4877-A627-EB5CAB7A777A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4B82D9
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16688 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:36 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3020267373-1215779965-1558914982-2054650539
	Account Name:		B4059F6D-547D-4877-A627-EB5CAB7A777A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4B82D9
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16687 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3020267373-1215779965-1558914982-2054650539
	Account Name:		B4059F6D-547D-4877-A627-EB5CAB7A777A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4B82D9
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16686 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		B4059F6D-547D-4877-A627-EB5CAB7A777A
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16685 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x4AEE23
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16684 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:32 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-545601557-1164083545-726843789-3758914317
	Account Name:		20853815-8159-4562-8DC1-522B0D7B0CE0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4B2047
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16683 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:26 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-545601557-1164083545-726843789-3758914317
	Account Name:		20853815-8159-4562-8DC1-522B0D7B0CE0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4B2047
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16682 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-545601557-1164083545-726843789-3758914317
	Account Name:		20853815-8159-4562-8DC1-522B0D7B0CE0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4B2047
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16681 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		20853815-8159-4562-8DC1-522B0D7B0CE0
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16680 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-545601557-1164083545-726843789-3758914317
	Account Name:		20853815-8159-4562-8DC1-522B0D7B0CE0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4B1219
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16679 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:26 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-545601557-1164083545-726843789-3758914317
	Account Name:		20853815-8159-4562-8DC1-522B0D7B0CE0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4B1360
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16678 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-545601557-1164083545-726843789-3758914317
	Account Name:		20853815-8159-4562-8DC1-522B0D7B0CE0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4B1360
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16677 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		20853815-8159-4562-8DC1-522B0D7B0CE0
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16676 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-545601557-1164083545-726843789-3758914317
	Account Name:		20853815-8159-4562-8DC1-522B0D7B0CE0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4B1307
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16675 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:26 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-545601557-1164083545-726843789-3758914317
	Account Name:		20853815-8159-4562-8DC1-522B0D7B0CE0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4B1307
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16674 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-545601557-1164083545-726843789-3758914317
	Account Name:		20853815-8159-4562-8DC1-522B0D7B0CE0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4B1307
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16673 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		20853815-8159-4562-8DC1-522B0D7B0CE0
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16672 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-545601557-1164083545-726843789-3758914317
	Account Name:		20853815-8159-4562-8DC1-522B0D7B0CE0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4B12BE
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16671 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:26 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-545601557-1164083545-726843789-3758914317
	Account Name:		20853815-8159-4562-8DC1-522B0D7B0CE0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4B12BE
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16670 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-545601557-1164083545-726843789-3758914317
	Account Name:		20853815-8159-4562-8DC1-522B0D7B0CE0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4B12BE
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16669 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		20853815-8159-4562-8DC1-522B0D7B0CE0
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16668 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-545601557-1164083545-726843789-3758914317
	Account Name:		20853815-8159-4562-8DC1-522B0D7B0CE0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4B1219
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16667 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-545601557-1164083545-726843789-3758914317
	Account Name:		20853815-8159-4562-8DC1-522B0D7B0CE0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4B1219
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16666 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		20853815-8159-4562-8DC1-522B0D7B0CE0
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16665 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3020267373-1215779965-1558914982-2054650539
	Account Name:		B4059F6D-547D-4877-A627-EB5CAB7A777A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4AFEEB
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16664 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:20 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3020267373-1215779965-1558914982-2054650539
	Account Name:		B4059F6D-547D-4877-A627-EB5CAB7A777A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4AFEEB
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16663 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3020267373-1215779965-1558914982-2054650539
	Account Name:		B4059F6D-547D-4877-A627-EB5CAB7A777A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4AFEEB
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16662 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		B4059F6D-547D-4877-A627-EB5CAB7A777A
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16661 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3020267373-1215779965-1558914982-2054650539
	Account Name:		B4059F6D-547D-4877-A627-EB5CAB7A777A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4AEFBE
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16660 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:20 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3020267373-1215779965-1558914982-2054650539
	Account Name:		B4059F6D-547D-4877-A627-EB5CAB7A777A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4AF106
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16659 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3020267373-1215779965-1558914982-2054650539
	Account Name:		B4059F6D-547D-4877-A627-EB5CAB7A777A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4AF106
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16658 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		B4059F6D-547D-4877-A627-EB5CAB7A777A
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16657 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3020267373-1215779965-1558914982-2054650539
	Account Name:		B4059F6D-547D-4877-A627-EB5CAB7A777A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4AF0AD
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16656 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:20 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3020267373-1215779965-1558914982-2054650539
	Account Name:		B4059F6D-547D-4877-A627-EB5CAB7A777A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4AF0AD
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16655 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3020267373-1215779965-1558914982-2054650539
	Account Name:		B4059F6D-547D-4877-A627-EB5CAB7A777A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4AF0AD
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16654 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		B4059F6D-547D-4877-A627-EB5CAB7A777A
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16653 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3020267373-1215779965-1558914982-2054650539
	Account Name:		B4059F6D-547D-4877-A627-EB5CAB7A777A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4AF064
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16652 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:20 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3020267373-1215779965-1558914982-2054650539
	Account Name:		B4059F6D-547D-4877-A627-EB5CAB7A777A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4AF064
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16651 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3020267373-1215779965-1558914982-2054650539
	Account Name:		B4059F6D-547D-4877-A627-EB5CAB7A777A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4AF064
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16650 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		B4059F6D-547D-4877-A627-EB5CAB7A777A
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16649 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3020267373-1215779965-1558914982-2054650539
	Account Name:		B4059F6D-547D-4877-A627-EB5CAB7A777A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4AEFBE
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16648 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3020267373-1215779965-1558914982-2054650539
	Account Name:		B4059F6D-547D-4877-A627-EB5CAB7A777A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4AEFBE
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16647 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		B4059F6D-547D-4877-A627-EB5CAB7A777A
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16646 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x4AEE23
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52440
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16645 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:18 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x4AEE23
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16644 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:35:18 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1779807480-1340753007-1959190459-3037089821
	Account Name:		6A15B4F8-446F-4FEA-BBDF-C6741D5006B5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x480A52
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16643 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:34:54 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1779807480-1340753007-1959190459-3037089821
	Account Name:		6A15B4F8-446F-4FEA-BBDF-C6741D5006B5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4A7726
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16642 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:34:51 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1779807480-1340753007-1959190459-3037089821
	Account Name:		6A15B4F8-446F-4FEA-BBDF-C6741D5006B5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4A7726
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16641 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:34:51 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1779807480-1340753007-1959190459-3037089821
	Account Name:		6A15B4F8-446F-4FEA-BBDF-C6741D5006B5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4A7726
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16640 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:34:51 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6A15B4F8-446F-4FEA-BBDF-C6741D5006B5
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16639 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:34:51 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1729406318-1177072154-1134182031-1178867242
	Account Name:		6714A56E-B21A-4628-8F3E-9A432A164446
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x48C716
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16638 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:34:46 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x49A80F
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16637 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:33:27 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x49A80F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52432
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16636 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:33:17 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x49A80F
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16635 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:33:17 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2592689039-1164549686-477264574-3033587884
	Account Name:		9A894B8F-9E36-4569-BE7A-721CACE0D0B4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4893E8
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16634 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:33:10 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1729406318-1177072154-1134182031-1178867242
	Account Name:		6714A56E-B21A-4628-8F3E-9A432A164446
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x49637B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16633 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:33:09 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1729406318-1177072154-1134182031-1178867242
	Account Name:		6714A56E-B21A-4628-8F3E-9A432A164446
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x49637B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16632 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:33:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1729406318-1177072154-1134182031-1178867242
	Account Name:		6714A56E-B21A-4628-8F3E-9A432A164446
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x49637B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16631 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:33:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6714A56E-B21A-4628-8F3E-9A432A164446
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16630 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:33:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1729406318-1177072154-1134182031-1178867242
	Account Name:		6714A56E-B21A-4628-8F3E-9A432A164446
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x491BB6
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16629 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:33:01 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1729406318-1177072154-1134182031-1178867242
	Account Name:		6714A56E-B21A-4628-8F3E-9A432A164446
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x491BB6
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16628 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:33:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1729406318-1177072154-1134182031-1178867242
	Account Name:		6714A56E-B21A-4628-8F3E-9A432A164446
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x491BB6
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16627 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:33:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6714A56E-B21A-4628-8F3E-9A432A164446
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16626 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:33:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2592689039-1164549686-477264574-3033587884
	Account Name:		9A894B8F-9E36-4569-BE7A-721CACE0D0B4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x48E931
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16625 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:58 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2592689039-1164549686-477264574-3033587884
	Account Name:		9A894B8F-9E36-4569-BE7A-721CACE0D0B4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x48E931
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16624 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2592689039-1164549686-477264574-3033587884
	Account Name:		9A894B8F-9E36-4569-BE7A-721CACE0D0B4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x48E931
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16623 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		9A894B8F-9E36-4569-BE7A-721CACE0D0B4
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16622 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1729406318-1177072154-1134182031-1178867242
	Account Name:		6714A56E-B21A-4628-8F3E-9A432A164446
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x48C550
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16621 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:55 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1729406318-1177072154-1134182031-1178867242
	Account Name:		6714A56E-B21A-4628-8F3E-9A432A164446
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x48C716
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16620 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1729406318-1177072154-1134182031-1178867242
	Account Name:		6714A56E-B21A-4628-8F3E-9A432A164446
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x48C716
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16619 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6714A56E-B21A-4628-8F3E-9A432A164446
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16618 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1729406318-1177072154-1134182031-1178867242
	Account Name:		6714A56E-B21A-4628-8F3E-9A432A164446
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x48C6BD
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16617 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:55 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1729406318-1177072154-1134182031-1178867242
	Account Name:		6714A56E-B21A-4628-8F3E-9A432A164446
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x48C6BD
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16616 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1729406318-1177072154-1134182031-1178867242
	Account Name:		6714A56E-B21A-4628-8F3E-9A432A164446
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x48C6BD
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16615 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6714A56E-B21A-4628-8F3E-9A432A164446
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16614 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1729406318-1177072154-1134182031-1178867242
	Account Name:		6714A56E-B21A-4628-8F3E-9A432A164446
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x48C608
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16613 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:55 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1729406318-1177072154-1134182031-1178867242
	Account Name:		6714A56E-B21A-4628-8F3E-9A432A164446
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x48C608
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16612 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1729406318-1177072154-1134182031-1178867242
	Account Name:		6714A56E-B21A-4628-8F3E-9A432A164446
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x48C608
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16611 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6714A56E-B21A-4628-8F3E-9A432A164446
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16610 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1729406318-1177072154-1134182031-1178867242
	Account Name:		6714A56E-B21A-4628-8F3E-9A432A164446
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x48C550
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16609 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1729406318-1177072154-1134182031-1178867242
	Account Name:		6714A56E-B21A-4628-8F3E-9A432A164446
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x48C550
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16608 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6714A56E-B21A-4628-8F3E-9A432A164446
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16607 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2592689039-1164549686-477264574-3033587884
	Account Name:		9A894B8F-9E36-4569-BE7A-721CACE0D0B4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x48A152
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16606 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:49 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2592689039-1164549686-477264574-3033587884
	Account Name:		9A894B8F-9E36-4569-BE7A-721CACE0D0B4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x48A152
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16605 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2592689039-1164549686-477264574-3033587884
	Account Name:		9A894B8F-9E36-4569-BE7A-721CACE0D0B4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x48A152
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16604 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		9A894B8F-9E36-4569-BE7A-721CACE0D0B4
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16603 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2592689039-1164549686-477264574-3033587884
	Account Name:		9A894B8F-9E36-4569-BE7A-721CACE0D0B4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x48929D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16602 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:49 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2592689039-1164549686-477264574-3033587884
	Account Name:		9A894B8F-9E36-4569-BE7A-721CACE0D0B4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4893E8
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16601 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2592689039-1164549686-477264574-3033587884
	Account Name:		9A894B8F-9E36-4569-BE7A-721CACE0D0B4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4893E8
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16600 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		9A894B8F-9E36-4569-BE7A-721CACE0D0B4
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16599 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2592689039-1164549686-477264574-3033587884
	Account Name:		9A894B8F-9E36-4569-BE7A-721CACE0D0B4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x48938F
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16598 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:49 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2592689039-1164549686-477264574-3033587884
	Account Name:		9A894B8F-9E36-4569-BE7A-721CACE0D0B4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x48938F
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16597 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2592689039-1164549686-477264574-3033587884
	Account Name:		9A894B8F-9E36-4569-BE7A-721CACE0D0B4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x48938F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16596 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		9A894B8F-9E36-4569-BE7A-721CACE0D0B4
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16595 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2592689039-1164549686-477264574-3033587884
	Account Name:		9A894B8F-9E36-4569-BE7A-721CACE0D0B4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x489346
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16594 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:49 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2592689039-1164549686-477264574-3033587884
	Account Name:		9A894B8F-9E36-4569-BE7A-721CACE0D0B4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x489346
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16593 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2592689039-1164549686-477264574-3033587884
	Account Name:		9A894B8F-9E36-4569-BE7A-721CACE0D0B4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x489346
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16592 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		9A894B8F-9E36-4569-BE7A-721CACE0D0B4
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16591 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2592689039-1164549686-477264574-3033587884
	Account Name:		9A894B8F-9E36-4569-BE7A-721CACE0D0B4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x48929D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16590 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2592689039-1164549686-477264574-3033587884
	Account Name:		9A894B8F-9E36-4569-BE7A-721CACE0D0B4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x48929D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16589 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		9A894B8F-9E36-4569-BE7A-721CACE0D0B4
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16588 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1779807480-1340753007-1959190459-3037089821
	Account Name:		6A15B4F8-446F-4FEA-BBDF-C6741D5006B5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x485459
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16587 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:30 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1779807480-1340753007-1959190459-3037089821
	Account Name:		6A15B4F8-446F-4FEA-BBDF-C6741D5006B5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x485459
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16586 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:30 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1779807480-1340753007-1959190459-3037089821
	Account Name:		6A15B4F8-446F-4FEA-BBDF-C6741D5006B5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x485459
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16585 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:30 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6A15B4F8-446F-4FEA-BBDF-C6741D5006B5
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16584 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:30 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1779807480-1340753007-1959190459-3037089821
	Account Name:		6A15B4F8-446F-4FEA-BBDF-C6741D5006B5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x481710
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16583 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:23 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1779807480-1340753007-1959190459-3037089821
	Account Name:		6A15B4F8-446F-4FEA-BBDF-C6741D5006B5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x481710
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16582 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1779807480-1340753007-1959190459-3037089821
	Account Name:		6A15B4F8-446F-4FEA-BBDF-C6741D5006B5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x481710
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16581 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6A15B4F8-446F-4FEA-BBDF-C6741D5006B5
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16580 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1779807480-1340753007-1959190459-3037089821
	Account Name:		6A15B4F8-446F-4FEA-BBDF-C6741D5006B5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x480892
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16579 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:22 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1779807480-1340753007-1959190459-3037089821
	Account Name:		6A15B4F8-446F-4FEA-BBDF-C6741D5006B5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x480A52
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16578 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1779807480-1340753007-1959190459-3037089821
	Account Name:		6A15B4F8-446F-4FEA-BBDF-C6741D5006B5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x480A52
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16577 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6A15B4F8-446F-4FEA-BBDF-C6741D5006B5
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16576 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1779807480-1340753007-1959190459-3037089821
	Account Name:		6A15B4F8-446F-4FEA-BBDF-C6741D5006B5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4809F9
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16575 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:22 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1779807480-1340753007-1959190459-3037089821
	Account Name:		6A15B4F8-446F-4FEA-BBDF-C6741D5006B5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4809F9
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16574 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1779807480-1340753007-1959190459-3037089821
	Account Name:		6A15B4F8-446F-4FEA-BBDF-C6741D5006B5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4809F9
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16573 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6A15B4F8-446F-4FEA-BBDF-C6741D5006B5
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16572 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1779807480-1340753007-1959190459-3037089821
	Account Name:		6A15B4F8-446F-4FEA-BBDF-C6741D5006B5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x48093B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16571 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:22 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1779807480-1340753007-1959190459-3037089821
	Account Name:		6A15B4F8-446F-4FEA-BBDF-C6741D5006B5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x48093B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16570 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1779807480-1340753007-1959190459-3037089821
	Account Name:		6A15B4F8-446F-4FEA-BBDF-C6741D5006B5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x48093B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16569 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6A15B4F8-446F-4FEA-BBDF-C6741D5006B5
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16568 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1779807480-1340753007-1959190459-3037089821
	Account Name:		6A15B4F8-446F-4FEA-BBDF-C6741D5006B5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x480892
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16567 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1779807480-1340753007-1959190459-3037089821
	Account Name:		6A15B4F8-446F-4FEA-BBDF-C6741D5006B5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x480892
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16566 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6A15B4F8-446F-4FEA-BBDF-C6741D5006B5
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16565 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1779008634-1281189403-306167170-139322258
	Account Name:		6A09847A-661B-4C5D-82BD-3F1292E34D08
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x477F27
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16564 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:32:01 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1779008634-1281189403-306167170-139322258
	Account Name:		6A09847A-661B-4C5D-82BD-3F1292E34D08
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x47A6C3
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16563 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:55 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1779008634-1281189403-306167170-139322258
	Account Name:		6A09847A-661B-4C5D-82BD-3F1292E34D08
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x47A6C3
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16562 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1779008634-1281189403-306167170-139322258
	Account Name:		6A09847A-661B-4C5D-82BD-3F1292E34D08
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x47A6C3
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16561 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6A09847A-661B-4C5D-82BD-3F1292E34D08
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16560 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1779008634-1281189403-306167170-139322258
	Account Name:		6A09847A-661B-4C5D-82BD-3F1292E34D08
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x478BEA
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16559 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:54 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1779008634-1281189403-306167170-139322258
	Account Name:		6A09847A-661B-4C5D-82BD-3F1292E34D08
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x478BEA
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16558 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1779008634-1281189403-306167170-139322258
	Account Name:		6A09847A-661B-4C5D-82BD-3F1292E34D08
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x478BEA
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16557 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6A09847A-661B-4C5D-82BD-3F1292E34D08
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16556 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1779008634-1281189403-306167170-139322258
	Account Name:		6A09847A-661B-4C5D-82BD-3F1292E34D08
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x477DDF
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16555 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:53 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1779008634-1281189403-306167170-139322258
	Account Name:		6A09847A-661B-4C5D-82BD-3F1292E34D08
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x477F27
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16554 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1779008634-1281189403-306167170-139322258
	Account Name:		6A09847A-661B-4C5D-82BD-3F1292E34D08
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x477F27
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16553 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6A09847A-661B-4C5D-82BD-3F1292E34D08
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16552 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1779008634-1281189403-306167170-139322258
	Account Name:		6A09847A-661B-4C5D-82BD-3F1292E34D08
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x477ECE
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16551 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:53 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1779008634-1281189403-306167170-139322258
	Account Name:		6A09847A-661B-4C5D-82BD-3F1292E34D08
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x477ECE
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16550 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1779008634-1281189403-306167170-139322258
	Account Name:		6A09847A-661B-4C5D-82BD-3F1292E34D08
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x477ECE
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16549 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6A09847A-661B-4C5D-82BD-3F1292E34D08
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16548 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1779008634-1281189403-306167170-139322258
	Account Name:		6A09847A-661B-4C5D-82BD-3F1292E34D08
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x477E85
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16547 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:53 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1779008634-1281189403-306167170-139322258
	Account Name:		6A09847A-661B-4C5D-82BD-3F1292E34D08
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x477E85
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16546 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1779008634-1281189403-306167170-139322258
	Account Name:		6A09847A-661B-4C5D-82BD-3F1292E34D08
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x477E85
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16545 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6A09847A-661B-4C5D-82BD-3F1292E34D08
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16544 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1779008634-1281189403-306167170-139322258
	Account Name:		6A09847A-661B-4C5D-82BD-3F1292E34D08
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x477DDF
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16543 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1779008634-1281189403-306167170-139322258
	Account Name:		6A09847A-661B-4C5D-82BD-3F1292E34D08
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x477DDF
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16542 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6A09847A-661B-4C5D-82BD-3F1292E34D08
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16541 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1828895389-1192409156-408741563-3137441884
	Account Name:		6D02BA9D-B844-4712-BBE6-5C185C9001BB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x46E163
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16540 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:52 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x46E01F
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16539 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:26 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1828895389-1192409156-408741563-3137441884
	Account Name:		6D02BA9D-B844-4712-BBE6-5C185C9001BB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4708CA
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16538 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:18 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1828895389-1192409156-408741563-3137441884
	Account Name:		6D02BA9D-B844-4712-BBE6-5C185C9001BB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4708CA
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16537 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:18 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1828895389-1192409156-408741563-3137441884
	Account Name:		6D02BA9D-B844-4712-BBE6-5C185C9001BB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4708CA
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16536 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:18 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6D02BA9D-B844-4712-BBE6-5C185C9001BB
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16535 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:18 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1828895389-1192409156-408741563-3137441884
	Account Name:		6D02BA9D-B844-4712-BBE6-5C185C9001BB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x46EFBD
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16534 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:17 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1828895389-1192409156-408741563-3137441884
	Account Name:		6D02BA9D-B844-4712-BBE6-5C185C9001BB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x46EFBD
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16533 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:17 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1828895389-1192409156-408741563-3137441884
	Account Name:		6D02BA9D-B844-4712-BBE6-5C185C9001BB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x46EFBD
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16532 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:17 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6D02BA9D-B844-4712-BBE6-5C185C9001BB
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16531 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:17 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1828895389-1192409156-408741563-3137441884
	Account Name:		6D02BA9D-B844-4712-BBE6-5C185C9001BB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x46E00A
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16530 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:16 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1828895389-1192409156-408741563-3137441884
	Account Name:		6D02BA9D-B844-4712-BBE6-5C185C9001BB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x46E163
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16529 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1828895389-1192409156-408741563-3137441884
	Account Name:		6D02BA9D-B844-4712-BBE6-5C185C9001BB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x46E163
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16528 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6D02BA9D-B844-4712-BBE6-5C185C9001BB
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16527 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1828895389-1192409156-408741563-3137441884
	Account Name:		6D02BA9D-B844-4712-BBE6-5C185C9001BB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x46E10A
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16526 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:16 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1828895389-1192409156-408741563-3137441884
	Account Name:		6D02BA9D-B844-4712-BBE6-5C185C9001BB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x46E10A
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16525 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1828895389-1192409156-408741563-3137441884
	Account Name:		6D02BA9D-B844-4712-BBE6-5C185C9001BB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x46E10A
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16524 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6D02BA9D-B844-4712-BBE6-5C185C9001BB
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16523 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1828895389-1192409156-408741563-3137441884
	Account Name:		6D02BA9D-B844-4712-BBE6-5C185C9001BB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x46E0C1
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16522 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:16 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1828895389-1192409156-408741563-3137441884
	Account Name:		6D02BA9D-B844-4712-BBE6-5C185C9001BB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x46E0C1
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16521 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1828895389-1192409156-408741563-3137441884
	Account Name:		6D02BA9D-B844-4712-BBE6-5C185C9001BB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x46E0C1
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16520 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6D02BA9D-B844-4712-BBE6-5C185C9001BB
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16519 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1828895389-1192409156-408741563-3137441884
	Account Name:		6D02BA9D-B844-4712-BBE6-5C185C9001BB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x46E00A
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16518 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1828895389-1192409156-408741563-3137441884
	Account Name:		6D02BA9D-B844-4712-BBE6-5C185C9001BB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x46E00A
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16517 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		6D02BA9D-B844-4712-BBE6-5C185C9001BB
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16516 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x46E01F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52423
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16515 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x46E01F
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16514 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-684355723-1141857357-3900708239-3683628169
	Account Name:		28CA708B-5C4D-440F-8F15-80E889B48FDB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x465F40
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16513 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-684355723-1141857357-3900708239-3683628169
	Account Name:		28CA708B-5C4D-440F-8F15-80E889B48FDB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x468569
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16512 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:00 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-684355723-1141857357-3900708239-3683628169
	Account Name:		28CA708B-5C4D-440F-8F15-80E889B48FDB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x468569
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16511 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-684355723-1141857357-3900708239-3683628169
	Account Name:		28CA708B-5C4D-440F-8F15-80E889B48FDB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x468569
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16510 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		28CA708B-5C4D-440F-8F15-80E889B48FDB
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16509 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:31:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-684355723-1141857357-3900708239-3683628169
	Account Name:		28CA708B-5C4D-440F-8F15-80E889B48FDB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x466BED
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16508 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:58 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-684355723-1141857357-3900708239-3683628169
	Account Name:		28CA708B-5C4D-440F-8F15-80E889B48FDB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x466BED
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16507 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-684355723-1141857357-3900708239-3683628169
	Account Name:		28CA708B-5C4D-440F-8F15-80E889B48FDB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x466BED
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16506 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		28CA708B-5C4D-440F-8F15-80E889B48FDB
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16505 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-684355723-1141857357-3900708239-3683628169
	Account Name:		28CA708B-5C4D-440F-8F15-80E889B48FDB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x465D84
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16504 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:58 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-684355723-1141857357-3900708239-3683628169
	Account Name:		28CA708B-5C4D-440F-8F15-80E889B48FDB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x465F40
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16503 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-684355723-1141857357-3900708239-3683628169
	Account Name:		28CA708B-5C4D-440F-8F15-80E889B48FDB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x465F40
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16502 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		28CA708B-5C4D-440F-8F15-80E889B48FDB
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16501 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-684355723-1141857357-3900708239-3683628169
	Account Name:		28CA708B-5C4D-440F-8F15-80E889B48FDB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x465EE7
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16500 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:58 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-684355723-1141857357-3900708239-3683628169
	Account Name:		28CA708B-5C4D-440F-8F15-80E889B48FDB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x465EE7
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16499 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-684355723-1141857357-3900708239-3683628169
	Account Name:		28CA708B-5C4D-440F-8F15-80E889B48FDB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x465EE7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16498 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		28CA708B-5C4D-440F-8F15-80E889B48FDB
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16497 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-684355723-1141857357-3900708239-3683628169
	Account Name:		28CA708B-5C4D-440F-8F15-80E889B48FDB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x465E8B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16496 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:58 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-684355723-1141857357-3900708239-3683628169
	Account Name:		28CA708B-5C4D-440F-8F15-80E889B48FDB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x465E8B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16495 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-684355723-1141857357-3900708239-3683628169
	Account Name:		28CA708B-5C4D-440F-8F15-80E889B48FDB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x465E8B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16494 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		28CA708B-5C4D-440F-8F15-80E889B48FDB
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16493 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-684355723-1141857357-3900708239-3683628169
	Account Name:		28CA708B-5C4D-440F-8F15-80E889B48FDB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x465D84
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16492 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-684355723-1141857357-3900708239-3683628169
	Account Name:		28CA708B-5C4D-440F-8F15-80E889B48FDB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x465D84
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16491 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		28CA708B-5C4D-440F-8F15-80E889B48FDB
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16490 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2863920045-1193381072-1450622609-1406347942
	Account Name:		AAB3F3AD-8CD0-4721-91BE-7656A62AD353
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x45C3D4
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16489 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:57 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2863920045-1193381072-1450622609-1406347942
	Account Name:		AAB3F3AD-8CD0-4721-91BE-7656A62AD353
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x45EA99
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16488 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:25 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2863920045-1193381072-1450622609-1406347942
	Account Name:		AAB3F3AD-8CD0-4721-91BE-7656A62AD353
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x45EA99
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16487 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2863920045-1193381072-1450622609-1406347942
	Account Name:		AAB3F3AD-8CD0-4721-91BE-7656A62AD353
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x45EA99
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16486 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AAB3F3AD-8CD0-4721-91BE-7656A62AD353
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16485 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2863920045-1193381072-1450622609-1406347942
	Account Name:		AAB3F3AD-8CD0-4721-91BE-7656A62AD353
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x45D10A
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16484 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:24 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2863920045-1193381072-1450622609-1406347942
	Account Name:		AAB3F3AD-8CD0-4721-91BE-7656A62AD353
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x45D10A
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16483 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2863920045-1193381072-1450622609-1406347942
	Account Name:		AAB3F3AD-8CD0-4721-91BE-7656A62AD353
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x45D10A
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16482 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AAB3F3AD-8CD0-4721-91BE-7656A62AD353
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16481 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2863920045-1193381072-1450622609-1406347942
	Account Name:		AAB3F3AD-8CD0-4721-91BE-7656A62AD353
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x45C28C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16480 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:23 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2863920045-1193381072-1450622609-1406347942
	Account Name:		AAB3F3AD-8CD0-4721-91BE-7656A62AD353
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x45C3D4
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16479 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2863920045-1193381072-1450622609-1406347942
	Account Name:		AAB3F3AD-8CD0-4721-91BE-7656A62AD353
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x45C3D4
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16478 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AAB3F3AD-8CD0-4721-91BE-7656A62AD353
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16477 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2863920045-1193381072-1450622609-1406347942
	Account Name:		AAB3F3AD-8CD0-4721-91BE-7656A62AD353
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x45C37B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16476 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:23 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2863920045-1193381072-1450622609-1406347942
	Account Name:		AAB3F3AD-8CD0-4721-91BE-7656A62AD353
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x45C37B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16475 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2863920045-1193381072-1450622609-1406347942
	Account Name:		AAB3F3AD-8CD0-4721-91BE-7656A62AD353
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x45C37B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16474 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AAB3F3AD-8CD0-4721-91BE-7656A62AD353
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16473 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2863920045-1193381072-1450622609-1406347942
	Account Name:		AAB3F3AD-8CD0-4721-91BE-7656A62AD353
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x45C332
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16472 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:23 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2863920045-1193381072-1450622609-1406347942
	Account Name:		AAB3F3AD-8CD0-4721-91BE-7656A62AD353
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x45C332
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16471 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2863920045-1193381072-1450622609-1406347942
	Account Name:		AAB3F3AD-8CD0-4721-91BE-7656A62AD353
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x45C332
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16470 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AAB3F3AD-8CD0-4721-91BE-7656A62AD353
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16469 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2863920045-1193381072-1450622609-1406347942
	Account Name:		AAB3F3AD-8CD0-4721-91BE-7656A62AD353
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x45C28C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16468 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2863920045-1193381072-1450622609-1406347942
	Account Name:		AAB3F3AD-8CD0-4721-91BE-7656A62AD353
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x45C28C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16467 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AAB3F3AD-8CD0-4721-91BE-7656A62AD353
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16466 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3183183598-1312569831-1367489186-761799472
	Account Name:		BDBB86EE-39E7-4E3C-A23A-82513023682D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x442BC7
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16465 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:09 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1684715393-1335865547-327142017-363324888
	Account Name:		646AB781-B0CB-4F9F-81CA-7F13D8E5A715
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4509DB
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16464 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:30:02 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1684715393-1335865547-327142017-363324888
	Account Name:		646AB781-B0CB-4F9F-81CA-7F13D8E5A715
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4530B0
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16463 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:56 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1684715393-1335865547-327142017-363324888
	Account Name:		646AB781-B0CB-4F9F-81CA-7F13D8E5A715
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4530B0
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16462 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1684715393-1335865547-327142017-363324888
	Account Name:		646AB781-B0CB-4F9F-81CA-7F13D8E5A715
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4530B0
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16461 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		646AB781-B0CB-4F9F-81CA-7F13D8E5A715
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16460 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1684715393-1335865547-327142017-363324888
	Account Name:		646AB781-B0CB-4F9F-81CA-7F13D8E5A715
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4516B9
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16459 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:55 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1684715393-1335865547-327142017-363324888
	Account Name:		646AB781-B0CB-4F9F-81CA-7F13D8E5A715
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4516B9
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16458 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1684715393-1335865547-327142017-363324888
	Account Name:		646AB781-B0CB-4F9F-81CA-7F13D8E5A715
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4516B9
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16457 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		646AB781-B0CB-4F9F-81CA-7F13D8E5A715
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16456 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1684715393-1335865547-327142017-363324888
	Account Name:		646AB781-B0CB-4F9F-81CA-7F13D8E5A715
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x450894
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16455 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:54 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1684715393-1335865547-327142017-363324888
	Account Name:		646AB781-B0CB-4F9F-81CA-7F13D8E5A715
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4509DB
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16454 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1684715393-1335865547-327142017-363324888
	Account Name:		646AB781-B0CB-4F9F-81CA-7F13D8E5A715
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4509DB
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16453 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		646AB781-B0CB-4F9F-81CA-7F13D8E5A715
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16452 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1684715393-1335865547-327142017-363324888
	Account Name:		646AB781-B0CB-4F9F-81CA-7F13D8E5A715
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x450982
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16451 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:54 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1684715393-1335865547-327142017-363324888
	Account Name:		646AB781-B0CB-4F9F-81CA-7F13D8E5A715
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x450982
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16450 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1684715393-1335865547-327142017-363324888
	Account Name:		646AB781-B0CB-4F9F-81CA-7F13D8E5A715
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x450982
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16449 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		646AB781-B0CB-4F9F-81CA-7F13D8E5A715
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16448 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1684715393-1335865547-327142017-363324888
	Account Name:		646AB781-B0CB-4F9F-81CA-7F13D8E5A715
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x450939
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16447 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:54 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1684715393-1335865547-327142017-363324888
	Account Name:		646AB781-B0CB-4F9F-81CA-7F13D8E5A715
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x450939
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16446 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1684715393-1335865547-327142017-363324888
	Account Name:		646AB781-B0CB-4F9F-81CA-7F13D8E5A715
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x450939
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16445 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		646AB781-B0CB-4F9F-81CA-7F13D8E5A715
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16444 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1684715393-1335865547-327142017-363324888
	Account Name:		646AB781-B0CB-4F9F-81CA-7F13D8E5A715
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x450894
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16443 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1684715393-1335865547-327142017-363324888
	Account Name:		646AB781-B0CB-4F9F-81CA-7F13D8E5A715
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x450894
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16442 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		646AB781-B0CB-4F9F-81CA-7F13D8E5A715
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16441 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1221177080-1084786024-78960768-3316237217
	Account Name:		48C9AEF8-8568-40A8-80D8-B404A1C3A9C5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4451FF
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16440 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:53 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x4440E4
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16439 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:29 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1221177080-1084786024-78960768-3316237217
	Account Name:		48C9AEF8-8568-40A8-80D8-B404A1C3A9C5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4490BA
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16438 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:18 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1221177080-1084786024-78960768-3316237217
	Account Name:		48C9AEF8-8568-40A8-80D8-B404A1C3A9C5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4490BA
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16437 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:18 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1221177080-1084786024-78960768-3316237217
	Account Name:		48C9AEF8-8568-40A8-80D8-B404A1C3A9C5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4490BA
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16436 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:18 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		48C9AEF8-8568-40A8-80D8-B404A1C3A9C5
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16435 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:18 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1221177080-1084786024-78960768-3316237217
	Account Name:		48C9AEF8-8568-40A8-80D8-B404A1C3A9C5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x446CD7
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16434 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:16 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1221177080-1084786024-78960768-3316237217
	Account Name:		48C9AEF8-8568-40A8-80D8-B404A1C3A9C5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x446CD7
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16433 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1221177080-1084786024-78960768-3316237217
	Account Name:		48C9AEF8-8568-40A8-80D8-B404A1C3A9C5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x446CD7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16432 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		48C9AEF8-8568-40A8-80D8-B404A1C3A9C5
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16431 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3183183598-1312569831-1367489186-761799472
	Account Name:		BDBB86EE-39E7-4E3C-A23A-82513023682D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4459C5
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16430 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:16 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3183183598-1312569831-1367489186-761799472
	Account Name:		BDBB86EE-39E7-4E3C-A23A-82513023682D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4459C5
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16429 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3183183598-1312569831-1367489186-761799472
	Account Name:		BDBB86EE-39E7-4E3C-A23A-82513023682D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4459C5
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16428 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		BDBB86EE-39E7-4E3C-A23A-82513023682D
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16427 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1221177080-1084786024-78960768-3316237217
	Account Name:		48C9AEF8-8568-40A8-80D8-B404A1C3A9C5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x444AE4
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16426 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:16 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1221177080-1084786024-78960768-3316237217
	Account Name:		48C9AEF8-8568-40A8-80D8-B404A1C3A9C5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4451FF
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16425 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1221177080-1084786024-78960768-3316237217
	Account Name:		48C9AEF8-8568-40A8-80D8-B404A1C3A9C5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4451FF
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16424 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		48C9AEF8-8568-40A8-80D8-B404A1C3A9C5
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16423 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1221177080-1084786024-78960768-3316237217
	Account Name:		48C9AEF8-8568-40A8-80D8-B404A1C3A9C5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x444FA7
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16422 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:16 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1221177080-1084786024-78960768-3316237217
	Account Name:		48C9AEF8-8568-40A8-80D8-B404A1C3A9C5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x444FA7
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16421 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1221177080-1084786024-78960768-3316237217
	Account Name:		48C9AEF8-8568-40A8-80D8-B404A1C3A9C5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x444FA7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16420 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		48C9AEF8-8568-40A8-80D8-B404A1C3A9C5
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16419 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1221177080-1084786024-78960768-3316237217
	Account Name:		48C9AEF8-8568-40A8-80D8-B404A1C3A9C5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x444E5B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16418 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:16 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1221177080-1084786024-78960768-3316237217
	Account Name:		48C9AEF8-8568-40A8-80D8-B404A1C3A9C5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x444E5B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16417 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1221177080-1084786024-78960768-3316237217
	Account Name:		48C9AEF8-8568-40A8-80D8-B404A1C3A9C5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x444E5B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16416 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		48C9AEF8-8568-40A8-80D8-B404A1C3A9C5
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16415 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1221177080-1084786024-78960768-3316237217
	Account Name:		48C9AEF8-8568-40A8-80D8-B404A1C3A9C5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x444AE4
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16414 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1221177080-1084786024-78960768-3316237217
	Account Name:		48C9AEF8-8568-40A8-80D8-B404A1C3A9C5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x444AE4
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16413 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		48C9AEF8-8568-40A8-80D8-B404A1C3A9C5
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16412 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x4440E4
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52398
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16411 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:15 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x4440E4
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16410 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:15 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3183183598-1312569831-1367489186-761799472
	Account Name:		BDBB86EE-39E7-4E3C-A23A-82513023682D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4438A0
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16409 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:15 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3183183598-1312569831-1367489186-761799472
	Account Name:		BDBB86EE-39E7-4E3C-A23A-82513023682D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4438A0
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16408 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:15 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3183183598-1312569831-1367489186-761799472
	Account Name:		BDBB86EE-39E7-4E3C-A23A-82513023682D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4438A0
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16407 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:15 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		BDBB86EE-39E7-4E3C-A23A-82513023682D
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16406 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:15 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3183183598-1312569831-1367489186-761799472
	Account Name:		BDBB86EE-39E7-4E3C-A23A-82513023682D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x44282C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16405 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:14 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3183183598-1312569831-1367489186-761799472
	Account Name:		BDBB86EE-39E7-4E3C-A23A-82513023682D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x442BC7
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16404 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3183183598-1312569831-1367489186-761799472
	Account Name:		BDBB86EE-39E7-4E3C-A23A-82513023682D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x442BC7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16403 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		BDBB86EE-39E7-4E3C-A23A-82513023682D
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16402 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3183183598-1312569831-1367489186-761799472
	Account Name:		BDBB86EE-39E7-4E3C-A23A-82513023682D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x442B68
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16401 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:14 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3183183598-1312569831-1367489186-761799472
	Account Name:		BDBB86EE-39E7-4E3C-A23A-82513023682D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x442B68
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16400 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3183183598-1312569831-1367489186-761799472
	Account Name:		BDBB86EE-39E7-4E3C-A23A-82513023682D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x442B68
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16399 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		BDBB86EE-39E7-4E3C-A23A-82513023682D
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16398 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3183183598-1312569831-1367489186-761799472
	Account Name:		BDBB86EE-39E7-4E3C-A23A-82513023682D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x442A4A
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16397 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:14 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3183183598-1312569831-1367489186-761799472
	Account Name:		BDBB86EE-39E7-4E3C-A23A-82513023682D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x442A4A
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16396 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3183183598-1312569831-1367489186-761799472
	Account Name:		BDBB86EE-39E7-4E3C-A23A-82513023682D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x442A4A
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16395 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		BDBB86EE-39E7-4E3C-A23A-82513023682D
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16394 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3183183598-1312569831-1367489186-761799472
	Account Name:		BDBB86EE-39E7-4E3C-A23A-82513023682D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x44282C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16393 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3183183598-1312569831-1367489186-761799472
	Account Name:		BDBB86EE-39E7-4E3C-A23A-82513023682D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x44282C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16392 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		BDBB86EE-39E7-4E3C-A23A-82513023682D
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16391 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:29:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2931258879-1282377293-1449702577-2190950929
	Account Name:		AEB775FF-864D-4C6F-B1B4-685611429782
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x42D66E
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16390 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:54 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3723990378-1337872431-2739050938-237682080
	Account Name:		DDF7956A-502F-4FBE-BA99-42A3A0BD2A0E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x42F25F
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16389 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:52 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2931258879-1282377293-1449702577-2190950929
	Account Name:		AEB775FF-864D-4C6F-B1B4-685611429782
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x437F3B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16388 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:50 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2931258879-1282377293-1449702577-2190950929
	Account Name:		AEB775FF-864D-4C6F-B1B4-685611429782
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x437F3B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16387 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:50 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2931258879-1282377293-1449702577-2190950929
	Account Name:		AEB775FF-864D-4C6F-B1B4-685611429782
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x437F3B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16386 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:50 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AEB775FF-864D-4C6F-B1B4-685611429782
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16385 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:50 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3723990378-1337872431-2739050938-237682080
	Account Name:		DDF7956A-502F-4FBE-BA99-42A3A0BD2A0E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4356CF
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16384 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:47 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3723990378-1337872431-2739050938-237682080
	Account Name:		DDF7956A-502F-4FBE-BA99-42A3A0BD2A0E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4356CF
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16383 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3723990378-1337872431-2739050938-237682080
	Account Name:		DDF7956A-502F-4FBE-BA99-42A3A0BD2A0E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4356CF
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16382 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DDF7956A-502F-4FBE-BA99-42A3A0BD2A0E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16381 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3723990378-1337872431-2739050938-237682080
	Account Name:		DDF7956A-502F-4FBE-BA99-42A3A0BD2A0E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4303B3
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16380 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:41 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3723990378-1337872431-2739050938-237682080
	Account Name:		DDF7956A-502F-4FBE-BA99-42A3A0BD2A0E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4303B3
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16379 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3723990378-1337872431-2739050938-237682080
	Account Name:		DDF7956A-502F-4FBE-BA99-42A3A0BD2A0E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4303B3
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16378 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DDF7956A-502F-4FBE-BA99-42A3A0BD2A0E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16377 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3723990378-1337872431-2739050938-237682080
	Account Name:		DDF7956A-502F-4FBE-BA99-42A3A0BD2A0E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x42F114
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16376 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:40 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3723990378-1337872431-2739050938-237682080
	Account Name:		DDF7956A-502F-4FBE-BA99-42A3A0BD2A0E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x42F25F
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16375 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3723990378-1337872431-2739050938-237682080
	Account Name:		DDF7956A-502F-4FBE-BA99-42A3A0BD2A0E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x42F25F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16374 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DDF7956A-502F-4FBE-BA99-42A3A0BD2A0E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16373 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3723990378-1337872431-2739050938-237682080
	Account Name:		DDF7956A-502F-4FBE-BA99-42A3A0BD2A0E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x42F205
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16372 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:40 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3723990378-1337872431-2739050938-237682080
	Account Name:		DDF7956A-502F-4FBE-BA99-42A3A0BD2A0E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x42F205
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16371 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3723990378-1337872431-2739050938-237682080
	Account Name:		DDF7956A-502F-4FBE-BA99-42A3A0BD2A0E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x42F205
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16370 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DDF7956A-502F-4FBE-BA99-42A3A0BD2A0E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16369 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3723990378-1337872431-2739050938-237682080
	Account Name:		DDF7956A-502F-4FBE-BA99-42A3A0BD2A0E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x42F1B9
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16368 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:40 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3723990378-1337872431-2739050938-237682080
	Account Name:		DDF7956A-502F-4FBE-BA99-42A3A0BD2A0E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x42F1B9
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16367 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3723990378-1337872431-2739050938-237682080
	Account Name:		DDF7956A-502F-4FBE-BA99-42A3A0BD2A0E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x42F1B9
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16366 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DDF7956A-502F-4FBE-BA99-42A3A0BD2A0E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16365 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3723990378-1337872431-2739050938-237682080
	Account Name:		DDF7956A-502F-4FBE-BA99-42A3A0BD2A0E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x42F114
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16364 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3723990378-1337872431-2739050938-237682080
	Account Name:		DDF7956A-502F-4FBE-BA99-42A3A0BD2A0E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x42F114
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16363 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DDF7956A-502F-4FBE-BA99-42A3A0BD2A0E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16362 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2931258879-1282377293-1449702577-2190950929
	Account Name:		AEB775FF-864D-4C6F-B1B4-685611429782
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x42E44A
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16361 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:39 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2931258879-1282377293-1449702577-2190950929
	Account Name:		AEB775FF-864D-4C6F-B1B4-685611429782
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x42E44A
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16360 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2931258879-1282377293-1449702577-2190950929
	Account Name:		AEB775FF-864D-4C6F-B1B4-685611429782
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x42E44A
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16359 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AEB775FF-864D-4C6F-B1B4-685611429782
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16358 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2931258879-1282377293-1449702577-2190950929
	Account Name:		AEB775FF-864D-4C6F-B1B4-685611429782
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x42D52A
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16357 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:39 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2931258879-1282377293-1449702577-2190950929
	Account Name:		AEB775FF-864D-4C6F-B1B4-685611429782
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x42D66E
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16356 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2931258879-1282377293-1449702577-2190950929
	Account Name:		AEB775FF-864D-4C6F-B1B4-685611429782
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x42D66E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16355 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AEB775FF-864D-4C6F-B1B4-685611429782
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16354 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2931258879-1282377293-1449702577-2190950929
	Account Name:		AEB775FF-864D-4C6F-B1B4-685611429782
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x42D615
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16353 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:39 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2931258879-1282377293-1449702577-2190950929
	Account Name:		AEB775FF-864D-4C6F-B1B4-685611429782
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x42D615
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16352 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2931258879-1282377293-1449702577-2190950929
	Account Name:		AEB775FF-864D-4C6F-B1B4-685611429782
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x42D615
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16351 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AEB775FF-864D-4C6F-B1B4-685611429782
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16350 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2931258879-1282377293-1449702577-2190950929
	Account Name:		AEB775FF-864D-4C6F-B1B4-685611429782
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x42D5CC
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16349 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:39 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2931258879-1282377293-1449702577-2190950929
	Account Name:		AEB775FF-864D-4C6F-B1B4-685611429782
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x42D5CC
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16348 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2931258879-1282377293-1449702577-2190950929
	Account Name:		AEB775FF-864D-4C6F-B1B4-685611429782
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x42D5CC
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16347 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AEB775FF-864D-4C6F-B1B4-685611429782
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16346 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2931258879-1282377293-1449702577-2190950929
	Account Name:		AEB775FF-864D-4C6F-B1B4-685611429782
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x42D52A
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16345 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2931258879-1282377293-1449702577-2190950929
	Account Name:		AEB775FF-864D-4C6F-B1B4-685611429782
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x42D52A
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16344 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AEB775FF-864D-4C6F-B1B4-685611429782
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16343 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3989943142-1216008883-1603181974-3705892047
	Account Name:		EDD1B366-D2B3-487A-969D-8E5FCF6CE3DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x421D0F
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16342 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:08 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3989943142-1216008883-1603181974-3705892047
	Account Name:		EDD1B366-D2B3-487A-969D-8E5FCF6CE3DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4243DC
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16341 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:00 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3989943142-1216008883-1603181974-3705892047
	Account Name:		EDD1B366-D2B3-487A-969D-8E5FCF6CE3DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4243DC
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16340 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3989943142-1216008883-1603181974-3705892047
	Account Name:		EDD1B366-D2B3-487A-969D-8E5FCF6CE3DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4243DC
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16339 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		EDD1B366-D2B3-487A-969D-8E5FCF6CE3DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16338 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:28:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3989943142-1216008883-1603181974-3705892047
	Account Name:		EDD1B366-D2B3-487A-969D-8E5FCF6CE3DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x422A4A
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16337 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:27:59 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3989943142-1216008883-1603181974-3705892047
	Account Name:		EDD1B366-D2B3-487A-969D-8E5FCF6CE3DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x422A4A
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16336 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:27:59 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3989943142-1216008883-1603181974-3705892047
	Account Name:		EDD1B366-D2B3-487A-969D-8E5FCF6CE3DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x422A4A
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16335 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:27:59 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		EDD1B366-D2B3-487A-969D-8E5FCF6CE3DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16334 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:27:59 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3989943142-1216008883-1603181974-3705892047
	Account Name:		EDD1B366-D2B3-487A-969D-8E5FCF6CE3DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x421BC5
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16333 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:27:58 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3989943142-1216008883-1603181974-3705892047
	Account Name:		EDD1B366-D2B3-487A-969D-8E5FCF6CE3DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x421D0F
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16332 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:27:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3989943142-1216008883-1603181974-3705892047
	Account Name:		EDD1B366-D2B3-487A-969D-8E5FCF6CE3DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x421D0F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16331 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:27:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		EDD1B366-D2B3-487A-969D-8E5FCF6CE3DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16330 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:27:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3989943142-1216008883-1603181974-3705892047
	Account Name:		EDD1B366-D2B3-487A-969D-8E5FCF6CE3DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x421CB6
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16329 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:27:58 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3989943142-1216008883-1603181974-3705892047
	Account Name:		EDD1B366-D2B3-487A-969D-8E5FCF6CE3DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x421CB6
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16328 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:27:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3989943142-1216008883-1603181974-3705892047
	Account Name:		EDD1B366-D2B3-487A-969D-8E5FCF6CE3DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x421CB6
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16327 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:27:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		EDD1B366-D2B3-487A-969D-8E5FCF6CE3DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16326 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:27:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3989943142-1216008883-1603181974-3705892047
	Account Name:		EDD1B366-D2B3-487A-969D-8E5FCF6CE3DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x421C6B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16325 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:27:58 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3989943142-1216008883-1603181974-3705892047
	Account Name:		EDD1B366-D2B3-487A-969D-8E5FCF6CE3DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x421C6B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16324 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:27:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3989943142-1216008883-1603181974-3705892047
	Account Name:		EDD1B366-D2B3-487A-969D-8E5FCF6CE3DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x421C6B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16323 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:27:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		EDD1B366-D2B3-487A-969D-8E5FCF6CE3DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16322 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:27:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3989943142-1216008883-1603181974-3705892047
	Account Name:		EDD1B366-D2B3-487A-969D-8E5FCF6CE3DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x421BC5
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16321 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:27:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3989943142-1216008883-1603181974-3705892047
	Account Name:		EDD1B366-D2B3-487A-969D-8E5FCF6CE3DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x421BC5
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16320 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:27:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		EDD1B366-D2B3-487A-969D-8E5FCF6CE3DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16319 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:27:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2948295455-1257766281-2413725835-927080781
	Account Name:		AFBB6B1F-FD89-4AF7-8B88-DE8F4D214237
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x409792
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16318 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:27:38 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3887573882-1206659439-422959017-435993736
	Account Name:		E7B7AB7A-296F-47EC-A9D7-351988BCFC19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x406441
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16317 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:27:31 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x415E14
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16316 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:27:29 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x415E14
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52387
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16315 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:27:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x415E14
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16314 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:27:14 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2948295455-1257766281-2413725835-927080781
	Account Name:		AFBB6B1F-FD89-4AF7-8B88-DE8F4D214237
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4107F5
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16313 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:39 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2948295455-1257766281-2413725835-927080781
	Account Name:		AFBB6B1F-FD89-4AF7-8B88-DE8F4D214237
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4107F5
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16312 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2948295455-1257766281-2413725835-927080781
	Account Name:		AFBB6B1F-FD89-4AF7-8B88-DE8F4D214237
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4107F5
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16311 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AFBB6B1F-FD89-4AF7-8B88-DE8F4D214237
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16310 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3887573882-1206659439-422959017-435993736
	Account Name:		E7B7AB7A-296F-47EC-A9D7-351988BCFC19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x40CD9D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16309 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:35 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3887573882-1206659439-422959017-435993736
	Account Name:		E7B7AB7A-296F-47EC-A9D7-351988BCFC19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x40CD9D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16308 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3887573882-1206659439-422959017-435993736
	Account Name:		E7B7AB7A-296F-47EC-A9D7-351988BCFC19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x40CD9D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16307 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E7B7AB7A-296F-47EC-A9D7-351988BCFC19
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16306 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2948295455-1257766281-2413725835-927080781
	Account Name:		AFBB6B1F-FD89-4AF7-8B88-DE8F4D214237
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x40A472
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16305 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:32 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2948295455-1257766281-2413725835-927080781
	Account Name:		AFBB6B1F-FD89-4AF7-8B88-DE8F4D214237
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x40A472
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16304 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2948295455-1257766281-2413725835-927080781
	Account Name:		AFBB6B1F-FD89-4AF7-8B88-DE8F4D214237
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x40A472
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16303 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AFBB6B1F-FD89-4AF7-8B88-DE8F4D214237
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16302 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2948295455-1257766281-2413725835-927080781
	Account Name:		AFBB6B1F-FD89-4AF7-8B88-DE8F4D214237
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x409647
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16301 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:31 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2948295455-1257766281-2413725835-927080781
	Account Name:		AFBB6B1F-FD89-4AF7-8B88-DE8F4D214237
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x409792
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16300 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:31 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2948295455-1257766281-2413725835-927080781
	Account Name:		AFBB6B1F-FD89-4AF7-8B88-DE8F4D214237
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x409792
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16299 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:31 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AFBB6B1F-FD89-4AF7-8B88-DE8F4D214237
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16298 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:31 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2948295455-1257766281-2413725835-927080781
	Account Name:		AFBB6B1F-FD89-4AF7-8B88-DE8F4D214237
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x409739
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16297 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:31 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2948295455-1257766281-2413725835-927080781
	Account Name:		AFBB6B1F-FD89-4AF7-8B88-DE8F4D214237
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x409739
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16296 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:31 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2948295455-1257766281-2413725835-927080781
	Account Name:		AFBB6B1F-FD89-4AF7-8B88-DE8F4D214237
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x409739
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16295 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:31 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AFBB6B1F-FD89-4AF7-8B88-DE8F4D214237
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16294 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:31 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2948295455-1257766281-2413725835-927080781
	Account Name:		AFBB6B1F-FD89-4AF7-8B88-DE8F4D214237
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4096F0
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16293 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:31 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2948295455-1257766281-2413725835-927080781
	Account Name:		AFBB6B1F-FD89-4AF7-8B88-DE8F4D214237
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4096F0
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16292 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:31 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2948295455-1257766281-2413725835-927080781
	Account Name:		AFBB6B1F-FD89-4AF7-8B88-DE8F4D214237
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4096F0
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16291 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:31 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AFBB6B1F-FD89-4AF7-8B88-DE8F4D214237
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16290 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:31 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2948295455-1257766281-2413725835-927080781
	Account Name:		AFBB6B1F-FD89-4AF7-8B88-DE8F4D214237
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x409647
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16289 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:31 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2948295455-1257766281-2413725835-927080781
	Account Name:		AFBB6B1F-FD89-4AF7-8B88-DE8F4D214237
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x409647
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16288 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:31 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AFBB6B1F-FD89-4AF7-8B88-DE8F4D214237
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16287 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:31 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3887573882-1206659439-422959017-435993736
	Account Name:		E7B7AB7A-296F-47EC-A9D7-351988BCFC19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x40712B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16286 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:26 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3887573882-1206659439-422959017-435993736
	Account Name:		E7B7AB7A-296F-47EC-A9D7-351988BCFC19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x40712B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16285 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3887573882-1206659439-422959017-435993736
	Account Name:		E7B7AB7A-296F-47EC-A9D7-351988BCFC19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x40712B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16284 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E7B7AB7A-296F-47EC-A9D7-351988BCFC19
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16283 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3887573882-1206659439-422959017-435993736
	Account Name:		E7B7AB7A-296F-47EC-A9D7-351988BCFC19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4062F5
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16282 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:25 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3887573882-1206659439-422959017-435993736
	Account Name:		E7B7AB7A-296F-47EC-A9D7-351988BCFC19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x406441
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16281 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3887573882-1206659439-422959017-435993736
	Account Name:		E7B7AB7A-296F-47EC-A9D7-351988BCFC19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x406441
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16280 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E7B7AB7A-296F-47EC-A9D7-351988BCFC19
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16279 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3887573882-1206659439-422959017-435993736
	Account Name:		E7B7AB7A-296F-47EC-A9D7-351988BCFC19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4063E8
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16278 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:25 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3887573882-1206659439-422959017-435993736
	Account Name:		E7B7AB7A-296F-47EC-A9D7-351988BCFC19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4063E8
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16277 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3887573882-1206659439-422959017-435993736
	Account Name:		E7B7AB7A-296F-47EC-A9D7-351988BCFC19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4063E8
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16276 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E7B7AB7A-296F-47EC-A9D7-351988BCFC19
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16275 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3887573882-1206659439-422959017-435993736
	Account Name:		E7B7AB7A-296F-47EC-A9D7-351988BCFC19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x40639F
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16274 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:25 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3887573882-1206659439-422959017-435993736
	Account Name:		E7B7AB7A-296F-47EC-A9D7-351988BCFC19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x40639F
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16273 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3887573882-1206659439-422959017-435993736
	Account Name:		E7B7AB7A-296F-47EC-A9D7-351988BCFC19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x40639F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16272 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E7B7AB7A-296F-47EC-A9D7-351988BCFC19
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16271 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3887573882-1206659439-422959017-435993736
	Account Name:		E7B7AB7A-296F-47EC-A9D7-351988BCFC19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4062F5
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16270 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3887573882-1206659439-422959017-435993736
	Account Name:		E7B7AB7A-296F-47EC-A9D7-351988BCFC19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x4062F5
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16269 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E7B7AB7A-296F-47EC-A9D7-351988BCFC19
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16268 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:26:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x401496
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16267 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:25:23 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x401496
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52376
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16266 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:25:13 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x401496
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16265 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:25:13 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-450363086-1218277892-1045350316-1417746518
	Account Name:		1AD7FECE-7204-489D-ACC7-4E3E56188154
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3F4AD4
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16264 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:24:12 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-450363086-1218277892-1045350316-1417746518
	Account Name:		1AD7FECE-7204-489D-ACC7-4E3E56188154
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3F8E06
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16263 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:24:06 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-450363086-1218277892-1045350316-1417746518
	Account Name:		1AD7FECE-7204-489D-ACC7-4E3E56188154
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3F8E06
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16262 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:24:06 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-450363086-1218277892-1045350316-1417746518
	Account Name:		1AD7FECE-7204-489D-ACC7-4E3E56188154
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3F8E06
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16261 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:24:06 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1AD7FECE-7204-489D-ACC7-4E3E56188154
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16260 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:24:06 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-450363086-1218277892-1045350316-1417746518
	Account Name:		1AD7FECE-7204-489D-ACC7-4E3E56188154
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3F5799
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16259 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:58 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-450363086-1218277892-1045350316-1417746518
	Account Name:		1AD7FECE-7204-489D-ACC7-4E3E56188154
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3F5799
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16258 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-450363086-1218277892-1045350316-1417746518
	Account Name:		1AD7FECE-7204-489D-ACC7-4E3E56188154
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3F5799
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16257 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1AD7FECE-7204-489D-ACC7-4E3E56188154
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16256 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-450363086-1218277892-1045350316-1417746518
	Account Name:		1AD7FECE-7204-489D-ACC7-4E3E56188154
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3F4988
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16255 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:58 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-450363086-1218277892-1045350316-1417746518
	Account Name:		1AD7FECE-7204-489D-ACC7-4E3E56188154
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3F4AD4
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16254 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-450363086-1218277892-1045350316-1417746518
	Account Name:		1AD7FECE-7204-489D-ACC7-4E3E56188154
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3F4AD4
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16253 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1AD7FECE-7204-489D-ACC7-4E3E56188154
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16252 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-450363086-1218277892-1045350316-1417746518
	Account Name:		1AD7FECE-7204-489D-ACC7-4E3E56188154
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3F4A7B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16251 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:58 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-450363086-1218277892-1045350316-1417746518
	Account Name:		1AD7FECE-7204-489D-ACC7-4E3E56188154
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3F4A7B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16250 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-450363086-1218277892-1045350316-1417746518
	Account Name:		1AD7FECE-7204-489D-ACC7-4E3E56188154
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3F4A7B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16249 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1AD7FECE-7204-489D-ACC7-4E3E56188154
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16248 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-450363086-1218277892-1045350316-1417746518
	Account Name:		1AD7FECE-7204-489D-ACC7-4E3E56188154
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3F4A32
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16247 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:58 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-450363086-1218277892-1045350316-1417746518
	Account Name:		1AD7FECE-7204-489D-ACC7-4E3E56188154
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3F4A32
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16246 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-450363086-1218277892-1045350316-1417746518
	Account Name:		1AD7FECE-7204-489D-ACC7-4E3E56188154
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3F4A32
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16245 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1AD7FECE-7204-489D-ACC7-4E3E56188154
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16244 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-450363086-1218277892-1045350316-1417746518
	Account Name:		1AD7FECE-7204-489D-ACC7-4E3E56188154
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3F4988
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16243 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-450363086-1218277892-1045350316-1417746518
	Account Name:		1AD7FECE-7204-489D-ACC7-4E3E56188154
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3F4988
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16242 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1AD7FECE-7204-489D-ACC7-4E3E56188154
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16241 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4004274672-1297599708-3964812941-872642969
	Account Name:		EEAC61F0-CCDC-4D57-8D3E-52EC99790334
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3E8AD3
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16240 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4004274672-1297599708-3964812941-872642969
	Account Name:		EEAC61F0-CCDC-4D57-8D3E-52EC99790334
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3ECB24
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16239 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:29 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4004274672-1297599708-3964812941-872642969
	Account Name:		EEAC61F0-CCDC-4D57-8D3E-52EC99790334
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3ECB24
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16238 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:29 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4004274672-1297599708-3964812941-872642969
	Account Name:		EEAC61F0-CCDC-4D57-8D3E-52EC99790334
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3ECB24
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16237 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:29 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		EEAC61F0-CCDC-4D57-8D3E-52EC99790334
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16236 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:29 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E822D
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16235 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:28 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4004274672-1297599708-3964812941-872642969
	Account Name:		EEAC61F0-CCDC-4D57-8D3E-52EC99790334
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3E9799
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16234 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:21 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4004274672-1297599708-3964812941-872642969
	Account Name:		EEAC61F0-CCDC-4D57-8D3E-52EC99790334
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3E9799
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16233 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4004274672-1297599708-3964812941-872642969
	Account Name:		EEAC61F0-CCDC-4D57-8D3E-52EC99790334
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3E9799
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16232 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		EEAC61F0-CCDC-4D57-8D3E-52EC99790334
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16231 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4004274672-1297599708-3964812941-872642969
	Account Name:		EEAC61F0-CCDC-4D57-8D3E-52EC99790334
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3E898C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16230 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:21 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4004274672-1297599708-3964812941-872642969
	Account Name:		EEAC61F0-CCDC-4D57-8D3E-52EC99790334
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3E8AD3
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16229 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4004274672-1297599708-3964812941-872642969
	Account Name:		EEAC61F0-CCDC-4D57-8D3E-52EC99790334
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3E8AD3
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16228 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		EEAC61F0-CCDC-4D57-8D3E-52EC99790334
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16227 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4004274672-1297599708-3964812941-872642969
	Account Name:		EEAC61F0-CCDC-4D57-8D3E-52EC99790334
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3E8A7A
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16226 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:21 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4004274672-1297599708-3964812941-872642969
	Account Name:		EEAC61F0-CCDC-4D57-8D3E-52EC99790334
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3E8A7A
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16225 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4004274672-1297599708-3964812941-872642969
	Account Name:		EEAC61F0-CCDC-4D57-8D3E-52EC99790334
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3E8A7A
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16224 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		EEAC61F0-CCDC-4D57-8D3E-52EC99790334
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16223 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4004274672-1297599708-3964812941-872642969
	Account Name:		EEAC61F0-CCDC-4D57-8D3E-52EC99790334
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3E8A31
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16222 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:20 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4004274672-1297599708-3964812941-872642969
	Account Name:		EEAC61F0-CCDC-4D57-8D3E-52EC99790334
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3E8A31
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16221 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4004274672-1297599708-3964812941-872642969
	Account Name:		EEAC61F0-CCDC-4D57-8D3E-52EC99790334
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3E8A31
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16220 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		EEAC61F0-CCDC-4D57-8D3E-52EC99790334
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16219 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4004274672-1297599708-3964812941-872642969
	Account Name:		EEAC61F0-CCDC-4D57-8D3E-52EC99790334
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3E898C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16218 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4004274672-1297599708-3964812941-872642969
	Account Name:		EEAC61F0-CCDC-4D57-8D3E-52EC99790334
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3E898C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16217 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		EEAC61F0-CCDC-4D57-8D3E-52EC99790334
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16216 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x3E822D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52358
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16215 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E822D
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16214 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:23:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3810436033-1282264264-3722847910-400008036
	Account Name:		E31EA3C1-CCC8-4C6D-A626-E6DD64A3D717
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3DD79F
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16213 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:22:42 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3810436033-1282264264-3722847910-400008036
	Account Name:		E31EA3C1-CCC8-4C6D-A626-E6DD64A3D717
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3E04E2
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16212 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:22:35 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3810436033-1282264264-3722847910-400008036
	Account Name:		E31EA3C1-CCC8-4C6D-A626-E6DD64A3D717
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3E04E2
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16211 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:22:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3810436033-1282264264-3722847910-400008036
	Account Name:		E31EA3C1-CCC8-4C6D-A626-E6DD64A3D717
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3E04E2
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16210 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:22:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E31EA3C1-CCC8-4C6D-A626-E6DD64A3D717
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16209 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:22:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3810436033-1282264264-3722847910-400008036
	Account Name:		E31EA3C1-CCC8-4C6D-A626-E6DD64A3D717
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3DE9FA
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16208 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:22:35 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3810436033-1282264264-3722847910-400008036
	Account Name:		E31EA3C1-CCC8-4C6D-A626-E6DD64A3D717
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3DE9FA
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16207 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:22:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3810436033-1282264264-3722847910-400008036
	Account Name:		E31EA3C1-CCC8-4C6D-A626-E6DD64A3D717
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3DE9FA
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16206 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:22:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E31EA3C1-CCC8-4C6D-A626-E6DD64A3D717
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16205 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:22:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3810436033-1282264264-3722847910-400008036
	Account Name:		E31EA3C1-CCC8-4C6D-A626-E6DD64A3D717
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3DD653
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16204 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:22:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3810436033-1282264264-3722847910-400008036
	Account Name:		E31EA3C1-CCC8-4C6D-A626-E6DD64A3D717
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3DD79F
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16203 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:22:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3810436033-1282264264-3722847910-400008036
	Account Name:		E31EA3C1-CCC8-4C6D-A626-E6DD64A3D717
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3DD79F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16202 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:22:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E31EA3C1-CCC8-4C6D-A626-E6DD64A3D717
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16201 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:22:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3810436033-1282264264-3722847910-400008036
	Account Name:		E31EA3C1-CCC8-4C6D-A626-E6DD64A3D717
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3DD746
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16200 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:22:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3810436033-1282264264-3722847910-400008036
	Account Name:		E31EA3C1-CCC8-4C6D-A626-E6DD64A3D717
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3DD746
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16199 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:22:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3810436033-1282264264-3722847910-400008036
	Account Name:		E31EA3C1-CCC8-4C6D-A626-E6DD64A3D717
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3DD746
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16198 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:22:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E31EA3C1-CCC8-4C6D-A626-E6DD64A3D717
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16197 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:22:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3810436033-1282264264-3722847910-400008036
	Account Name:		E31EA3C1-CCC8-4C6D-A626-E6DD64A3D717
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3DD6FD
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16196 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:22:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3810436033-1282264264-3722847910-400008036
	Account Name:		E31EA3C1-CCC8-4C6D-A626-E6DD64A3D717
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3DD6FD
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16195 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:22:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3810436033-1282264264-3722847910-400008036
	Account Name:		E31EA3C1-CCC8-4C6D-A626-E6DD64A3D717
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3DD6FD
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16194 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:22:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E31EA3C1-CCC8-4C6D-A626-E6DD64A3D717
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16193 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:22:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3810436033-1282264264-3722847910-400008036
	Account Name:		E31EA3C1-CCC8-4C6D-A626-E6DD64A3D717
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3DD653
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16192 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:22:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3810436033-1282264264-3722847910-400008036
	Account Name:		E31EA3C1-CCC8-4C6D-A626-E6DD64A3D717
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3DD653
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16191 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:22:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E31EA3C1-CCC8-4C6D-A626-E6DD64A3D717
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16190 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:22:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1144668332-1199129532-2995715230-4149543324
	Account Name:		443A40AC-43BC-4779-9EFC-8EB29C0155F7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3CA643
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16189 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:22:13 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-942074322-1271836294-2800109957-950364614
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x396652
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16188 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:22:07 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3C910D
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16187 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:58 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1144668332-1199129532-2995715230-4149543324
	Account Name:		443A40AC-43BC-4779-9EFC-8EB29C0155F7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3CE9B2
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16186 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:33 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1144668332-1199129532-2995715230-4149543324
	Account Name:		443A40AC-43BC-4779-9EFC-8EB29C0155F7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3CE9B2
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16185 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1144668332-1199129532-2995715230-4149543324
	Account Name:		443A40AC-43BC-4779-9EFC-8EB29C0155F7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3CE9B2
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16184 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		443A40AC-43BC-4779-9EFC-8EB29C0155F7
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16183 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1144668332-1199129532-2995715230-4149543324
	Account Name:		443A40AC-43BC-4779-9EFC-8EB29C0155F7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3CB34F
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16182 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:27 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1144668332-1199129532-2995715230-4149543324
	Account Name:		443A40AC-43BC-4779-9EFC-8EB29C0155F7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3CB34F
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16181 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1144668332-1199129532-2995715230-4149543324
	Account Name:		443A40AC-43BC-4779-9EFC-8EB29C0155F7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3CB34F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16180 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		443A40AC-43BC-4779-9EFC-8EB29C0155F7
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16179 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1144668332-1199129532-2995715230-4149543324
	Account Name:		443A40AC-43BC-4779-9EFC-8EB29C0155F7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3CA481
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16178 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:26 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1144668332-1199129532-2995715230-4149543324
	Account Name:		443A40AC-43BC-4779-9EFC-8EB29C0155F7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3CA643
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16177 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1144668332-1199129532-2995715230-4149543324
	Account Name:		443A40AC-43BC-4779-9EFC-8EB29C0155F7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3CA643
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16176 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		443A40AC-43BC-4779-9EFC-8EB29C0155F7
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16175 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1144668332-1199129532-2995715230-4149543324
	Account Name:		443A40AC-43BC-4779-9EFC-8EB29C0155F7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3CA5EA
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16174 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:26 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1144668332-1199129532-2995715230-4149543324
	Account Name:		443A40AC-43BC-4779-9EFC-8EB29C0155F7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3CA5EA
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16173 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1144668332-1199129532-2995715230-4149543324
	Account Name:		443A40AC-43BC-4779-9EFC-8EB29C0155F7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3CA5EA
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16172 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		443A40AC-43BC-4779-9EFC-8EB29C0155F7
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16171 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1144668332-1199129532-2995715230-4149543324
	Account Name:		443A40AC-43BC-4779-9EFC-8EB29C0155F7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3CA58D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16170 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:26 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1144668332-1199129532-2995715230-4149543324
	Account Name:		443A40AC-43BC-4779-9EFC-8EB29C0155F7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3CA58D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16169 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1144668332-1199129532-2995715230-4149543324
	Account Name:		443A40AC-43BC-4779-9EFC-8EB29C0155F7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3CA58D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16168 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		443A40AC-43BC-4779-9EFC-8EB29C0155F7
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16167 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1144668332-1199129532-2995715230-4149543324
	Account Name:		443A40AC-43BC-4779-9EFC-8EB29C0155F7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3CA481
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16166 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1144668332-1199129532-2995715230-4149543324
	Account Name:		443A40AC-43BC-4779-9EFC-8EB29C0155F7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3CA481
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16165 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		443A40AC-43BC-4779-9EFC-8EB29C0155F7
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16164 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3C079E
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16163 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:16 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x3C910D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52342
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16162 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:11 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3C910D
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16161 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:11 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2851342031-1186648247-1281622960-1010725233
	Account Name:		A9F406CF-D0B7-46BA-B003-644C71713E3C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3C0CE6
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16160 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:10 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2851342031-1186648247-1281622960-1010725233
	Account Name:		A9F406CF-D0B7-46BA-B003-644C71713E3C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3C2E46
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16159 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:06 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2851342031-1186648247-1281622960-1010725233
	Account Name:		A9F406CF-D0B7-46BA-B003-644C71713E3C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3C2E46
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16158 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:06 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2851342031-1186648247-1281622960-1010725233
	Account Name:		A9F406CF-D0B7-46BA-B003-644C71713E3C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3C2E46
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16157 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:06 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		A9F406CF-D0B7-46BA-B003-644C71713E3C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16156 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:06 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2851342031-1186648247-1281622960-1010725233
	Account Name:		A9F406CF-D0B7-46BA-B003-644C71713E3C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3C1A82
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16155 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:05 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2851342031-1186648247-1281622960-1010725233
	Account Name:		A9F406CF-D0B7-46BA-B003-644C71713E3C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3C1A82
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16154 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2851342031-1186648247-1281622960-1010725233
	Account Name:		A9F406CF-D0B7-46BA-B003-644C71713E3C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3C1A82
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16153 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		A9F406CF-D0B7-46BA-B003-644C71713E3C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16152 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2851342031-1186648247-1281622960-1010725233
	Account Name:		A9F406CF-D0B7-46BA-B003-644C71713E3C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3C0B96
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16151 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:05 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2851342031-1186648247-1281622960-1010725233
	Account Name:		A9F406CF-D0B7-46BA-B003-644C71713E3C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3C0CE6
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16150 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2851342031-1186648247-1281622960-1010725233
	Account Name:		A9F406CF-D0B7-46BA-B003-644C71713E3C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3C0CE6
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16149 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		A9F406CF-D0B7-46BA-B003-644C71713E3C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16148 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2851342031-1186648247-1281622960-1010725233
	Account Name:		A9F406CF-D0B7-46BA-B003-644C71713E3C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3C0C8D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16147 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:05 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2851342031-1186648247-1281622960-1010725233
	Account Name:		A9F406CF-D0B7-46BA-B003-644C71713E3C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3C0C8D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16146 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2851342031-1186648247-1281622960-1010725233
	Account Name:		A9F406CF-D0B7-46BA-B003-644C71713E3C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3C0C8D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16145 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		A9F406CF-D0B7-46BA-B003-644C71713E3C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16144 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2851342031-1186648247-1281622960-1010725233
	Account Name:		A9F406CF-D0B7-46BA-B003-644C71713E3C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3C0C40
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16143 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:05 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2851342031-1186648247-1281622960-1010725233
	Account Name:		A9F406CF-D0B7-46BA-B003-644C71713E3C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3C0C40
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16142 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2851342031-1186648247-1281622960-1010725233
	Account Name:		A9F406CF-D0B7-46BA-B003-644C71713E3C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3C0C40
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16141 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		A9F406CF-D0B7-46BA-B003-644C71713E3C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16140 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2851342031-1186648247-1281622960-1010725233
	Account Name:		A9F406CF-D0B7-46BA-B003-644C71713E3C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3C0B96
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16139 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2851342031-1186648247-1281622960-1010725233
	Account Name:		A9F406CF-D0B7-46BA-B003-644C71713E3C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3C0B96
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16138 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		A9F406CF-D0B7-46BA-B003-644C71713E3C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16137 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3C081D
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16136 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:00 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3C0801
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16135 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:00 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3C0812
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16134 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:00 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3C081D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	CHH2-832929-1
	Source Network Address:	10.222.0.15
	Source Port:		52333
Detailed Authentication Information:
	Logon Process:		NtLmSsp 
	Authentication Package:	NTLM
	Transited Services:	-
	Package Name (NTLM only):	NTLM V2
	Key Length:		128
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16133 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3C081D
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16132 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3C0812
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	CHH2-832929-1
	Source Network Address:	10.222.0.15
	Source Port:		52332
Detailed Authentication Information:
	Logon Process:		NtLmSsp 
	Authentication Package:	NTLM
	Transited Services:	-
	Package Name (NTLM only):	NTLM V2
	Key Length:		128
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16131 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3C0812
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16130 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3C0801
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	CHH2-832929-1
	Source Network Address:	10.222.0.15
	Source Port:		52331
Detailed Authentication Information:
	Logon Process:		NtLmSsp 
	Authentication Package:	NTLM
	Transited Services:	-
	Package Name (NTLM only):	NTLM V2
	Key Length:		128
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16129 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3C0801
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16128 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3C079E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	CHH2-832929-1
	Source Network Address:	10.222.0.15
	Source Port:		52330
Detailed Authentication Information:
	Logon Process:		NtLmSsp 
	Authentication Package:	NTLM
	Transited Services:	-
	Package Name (NTLM only):	NTLM V2
	Key Length:		128
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16127 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3C079E
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16126 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:21:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-833191624-1162528023-1329774229-34926255
	Account Name:		31A97EC8-C517-454A-95BE-424FAFEE1402
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x337AFE
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16125 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:20:53 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3339110638-1301414111-4107350206-3811367986
	Account Name:		C706C8EE-00DF-4D92-BE30-D1F432DC2CE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3AE121
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16124 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:20:46 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x38BD1F
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16123 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:20:28 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3339110638-1301414111-4107350206-3811367986
	Account Name:		C706C8EE-00DF-4D92-BE30-D1F432DC2CE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3B22E7
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16122 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:20:11 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3339110638-1301414111-4107350206-3811367986
	Account Name:		C706C8EE-00DF-4D92-BE30-D1F432DC2CE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3B22E7
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16121 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:20:11 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3339110638-1301414111-4107350206-3811367986
	Account Name:		C706C8EE-00DF-4D92-BE30-D1F432DC2CE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3B22E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16120 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:20:11 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		C706C8EE-00DF-4D92-BE30-D1F432DC2CE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16119 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:20:11 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3339110638-1301414111-4107350206-3811367986
	Account Name:		C706C8EE-00DF-4D92-BE30-D1F432DC2CE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3AEE47
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16118 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:20:03 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3339110638-1301414111-4107350206-3811367986
	Account Name:		C706C8EE-00DF-4D92-BE30-D1F432DC2CE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3AEE47
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16117 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:20:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3339110638-1301414111-4107350206-3811367986
	Account Name:		C706C8EE-00DF-4D92-BE30-D1F432DC2CE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3AEE47
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16116 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:20:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		C706C8EE-00DF-4D92-BE30-D1F432DC2CE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16115 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:20:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3339110638-1301414111-4107350206-3811367986
	Account Name:		C706C8EE-00DF-4D92-BE30-D1F432DC2CE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3ADFDA
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16114 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:20:02 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3339110638-1301414111-4107350206-3811367986
	Account Name:		C706C8EE-00DF-4D92-BE30-D1F432DC2CE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3AE121
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16113 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:20:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3339110638-1301414111-4107350206-3811367986
	Account Name:		C706C8EE-00DF-4D92-BE30-D1F432DC2CE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3AE121
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16112 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:20:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		C706C8EE-00DF-4D92-BE30-D1F432DC2CE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16111 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:20:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3339110638-1301414111-4107350206-3811367986
	Account Name:		C706C8EE-00DF-4D92-BE30-D1F432DC2CE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3AE0C8
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16110 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:20:02 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3339110638-1301414111-4107350206-3811367986
	Account Name:		C706C8EE-00DF-4D92-BE30-D1F432DC2CE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3AE0C8
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16109 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:20:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3339110638-1301414111-4107350206-3811367986
	Account Name:		C706C8EE-00DF-4D92-BE30-D1F432DC2CE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3AE0C8
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16108 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:20:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		C706C8EE-00DF-4D92-BE30-D1F432DC2CE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16107 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:20:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3339110638-1301414111-4107350206-3811367986
	Account Name:		C706C8EE-00DF-4D92-BE30-D1F432DC2CE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3AE07F
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16106 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:20:02 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3339110638-1301414111-4107350206-3811367986
	Account Name:		C706C8EE-00DF-4D92-BE30-D1F432DC2CE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3AE07F
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16105 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:20:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3339110638-1301414111-4107350206-3811367986
	Account Name:		C706C8EE-00DF-4D92-BE30-D1F432DC2CE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3AE07F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16104 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:20:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		C706C8EE-00DF-4D92-BE30-D1F432DC2CE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16103 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:20:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3339110638-1301414111-4107350206-3811367986
	Account Name:		C706C8EE-00DF-4D92-BE30-D1F432DC2CE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3ADFDA
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16102 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:20:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3339110638-1301414111-4107350206-3811367986
	Account Name:		C706C8EE-00DF-4D92-BE30-D1F432DC2CE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3ADFDA
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16101 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:20:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		C706C8EE-00DF-4D92-BE30-D1F432DC2CE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16100 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:20:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-942074322-1271836294-2800109957-950364614
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3ACA46
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16099 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:59 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-942074322-1271836294-2800109957-950364614
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3ACA46
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16098 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:59 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-942074322-1271836294-2800109957-950364614
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3ACA46
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16097 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:59 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16096 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:59 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-942074322-1271836294-2800109957-950364614
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3AB3FA
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16095 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:58 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-942074322-1271836294-2800109957-950364614
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3AB3FA
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16094 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-942074322-1271836294-2800109957-950364614
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3AB3FA
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16093 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16092 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-942074322-1271836294-2800109957-950364614
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3AAC2D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16091 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:57 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-942074322-1271836294-2800109957-950364614
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3AAC2D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16090 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:57 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-942074322-1271836294-2800109957-950364614
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3AAC2D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16089 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:57 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16088 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:57 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3598151298-1264741718-1460404615-668293141
	Account Name:		D6776E82-6D56-4B62-8701-0C571558D527
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x39ED97
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16087 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:47 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3598151298-1264741718-1460404615-668293141
	Account Name:		D6776E82-6D56-4B62-8701-0C571558D527
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3A2D67
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16086 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:41 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3598151298-1264741718-1460404615-668293141
	Account Name:		D6776E82-6D56-4B62-8701-0C571558D527
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3A2D67
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16085 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3598151298-1264741718-1460404615-668293141
	Account Name:		D6776E82-6D56-4B62-8701-0C571558D527
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3A2D67
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16084 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		D6776E82-6D56-4B62-8701-0C571558D527
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16083 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3598151298-1264741718-1460404615-668293141
	Account Name:		D6776E82-6D56-4B62-8701-0C571558D527
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x39FABC
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16082 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:36 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3598151298-1264741718-1460404615-668293141
	Account Name:		D6776E82-6D56-4B62-8701-0C571558D527
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x39FABC
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16081 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3598151298-1264741718-1460404615-668293141
	Account Name:		D6776E82-6D56-4B62-8701-0C571558D527
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x39FABC
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16080 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		D6776E82-6D56-4B62-8701-0C571558D527
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16079 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3598151298-1264741718-1460404615-668293141
	Account Name:		D6776E82-6D56-4B62-8701-0C571558D527
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x39EBD8
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16078 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:35 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3598151298-1264741718-1460404615-668293141
	Account Name:		D6776E82-6D56-4B62-8701-0C571558D527
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x39ED97
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16077 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3598151298-1264741718-1460404615-668293141
	Account Name:		D6776E82-6D56-4B62-8701-0C571558D527
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x39ED97
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16076 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		D6776E82-6D56-4B62-8701-0C571558D527
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16075 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3598151298-1264741718-1460404615-668293141
	Account Name:		D6776E82-6D56-4B62-8701-0C571558D527
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x39ED3E
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16074 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:35 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3598151298-1264741718-1460404615-668293141
	Account Name:		D6776E82-6D56-4B62-8701-0C571558D527
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x39ED3E
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16073 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3598151298-1264741718-1460404615-668293141
	Account Name:		D6776E82-6D56-4B62-8701-0C571558D527
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x39ED3E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16072 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		D6776E82-6D56-4B62-8701-0C571558D527
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16071 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3598151298-1264741718-1460404615-668293141
	Account Name:		D6776E82-6D56-4B62-8701-0C571558D527
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x39ECB2
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16070 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:35 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3598151298-1264741718-1460404615-668293141
	Account Name:		D6776E82-6D56-4B62-8701-0C571558D527
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x39ECB2
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16069 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3598151298-1264741718-1460404615-668293141
	Account Name:		D6776E82-6D56-4B62-8701-0C571558D527
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x39ECB2
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16068 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		D6776E82-6D56-4B62-8701-0C571558D527
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16067 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3598151298-1264741718-1460404615-668293141
	Account Name:		D6776E82-6D56-4B62-8701-0C571558D527
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x39EBD8
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16066 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3598151298-1264741718-1460404615-668293141
	Account Name:		D6776E82-6D56-4B62-8701-0C571558D527
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x39EBD8
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16065 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		D6776E82-6D56-4B62-8701-0C571558D527
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16064 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-942074322-1271836294-2800109957-950364614
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x39B318
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16063 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:28 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-942074322-1271836294-2800109957-950364614
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x39B318
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16062 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:28 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-942074322-1271836294-2800109957-950364614
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x39B318
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16061 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:28 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16060 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:28 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-942074322-1271836294-2800109957-950364614
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x397342
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16059 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:22 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-942074322-1271836294-2800109957-950364614
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x397342
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16058 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-942074322-1271836294-2800109957-950364614
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x397342
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16057 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16056 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-942074322-1271836294-2800109957-950364614
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3964B8
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16055 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:22 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-942074322-1271836294-2800109957-950364614
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x396652
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16054 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-942074322-1271836294-2800109957-950364614
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x396652
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16053 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16052 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-942074322-1271836294-2800109957-950364614
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3965F9
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16051 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:22 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-942074322-1271836294-2800109957-950364614
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3965F9
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16050 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-942074322-1271836294-2800109957-950364614
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3965F9
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16049 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16048 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-942074322-1271836294-2800109957-950364614
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3965B0
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16047 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:22 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-942074322-1271836294-2800109957-950364614
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3965B0
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16046 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-942074322-1271836294-2800109957-950364614
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3965B0
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16045 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16044 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-942074322-1271836294-2800109957-950364614
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3964B8
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16043 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-942074322-1271836294-2800109957-950364614
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3964B8
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16042 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		3826E9D2-AE86-4BCE-8549-E6A6C669A538
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16041 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3495183166-1335081375-3441320851-3591836127
	Account Name:		D054433E-B99F-4F93-9363-1ECDDF1117D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x372D7D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16040 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:21 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-924262910-1134017427-3944278930-2697678322
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x362ADD
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16039 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:19 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x38BD1F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52310
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16038 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x38BD1F
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16037 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:19:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-924262910-1134017427-3944278930-2697678322
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3883CE
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16036 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:43 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-924262910-1134017427-3944278930-2697678322
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3883CE
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16035 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:43 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-924262910-1134017427-3944278930-2697678322
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3883CE
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16034 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:43 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16033 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:43 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-924262910-1134017427-3944278930-2697678322
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x386F4D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16032 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:41 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-924262910-1134017427-3944278930-2697678322
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x386F4D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16031 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-924262910-1134017427-3944278930-2697678322
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x386F4D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16030 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16029 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-924262910-1134017427-3944278930-2697678322
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x386757
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16028 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:41 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-924262910-1134017427-3944278930-2697678322
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x386757
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16027 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-924262910-1134017427-3944278930-2697678322
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x386757
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16026 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16025 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1294534338-1247116953-345254546-2208187226
	Account Name:		4D2906C2-7E99-4A55-922A-94145A439E83
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x370BB7
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16024 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:36 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-356743986-1292746153-3794459548-3694457900
	Account Name:		15437B32-BDA9-4D0D-9CDB-2AE22CF434DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x359818
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16023 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:36 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3495183166-1335081375-3441320851-3591836127
	Account Name:		D054433E-B99F-4F93-9363-1ECDDF1117D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x37C23D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16022 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3495183166-1335081375-3441320851-3591836127
	Account Name:		D054433E-B99F-4F93-9363-1ECDDF1117D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x37C23D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16021 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3495183166-1335081375-3441320851-3591836127
	Account Name:		D054433E-B99F-4F93-9363-1ECDDF1117D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x37C23D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16020 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		D054433E-B99F-4F93-9363-1ECDDF1117D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16019 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1294534338-1247116953-345254546-2208187226
	Account Name:		4D2906C2-7E99-4A55-922A-94145A439E83
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x378D15
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16018 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:32 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1294534338-1247116953-345254546-2208187226
	Account Name:		4D2906C2-7E99-4A55-922A-94145A439E83
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x378D15
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16017 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1294534338-1247116953-345254546-2208187226
	Account Name:		4D2906C2-7E99-4A55-922A-94145A439E83
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x378D15
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16016 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		4D2906C2-7E99-4A55-922A-94145A439E83
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16015 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3495183166-1335081375-3441320851-3591836127
	Account Name:		D054433E-B99F-4F93-9363-1ECDDF1117D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x373B1B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16014 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:25 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3495183166-1335081375-3441320851-3591836127
	Account Name:		D054433E-B99F-4F93-9363-1ECDDF1117D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x373B1B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16013 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3495183166-1335081375-3441320851-3591836127
	Account Name:		D054433E-B99F-4F93-9363-1ECDDF1117D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x373B1B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16012 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		D054433E-B99F-4F93-9363-1ECDDF1117D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16011 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3495183166-1335081375-3441320851-3591836127
	Account Name:		D054433E-B99F-4F93-9363-1ECDDF1117D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x372BA9
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16010 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:25 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3495183166-1335081375-3441320851-3591836127
	Account Name:		D054433E-B99F-4F93-9363-1ECDDF1117D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x372D7D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16009 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3495183166-1335081375-3441320851-3591836127
	Account Name:		D054433E-B99F-4F93-9363-1ECDDF1117D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x372D7D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16008 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		D054433E-B99F-4F93-9363-1ECDDF1117D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16007 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3495183166-1335081375-3441320851-3591836127
	Account Name:		D054433E-B99F-4F93-9363-1ECDDF1117D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x372C9B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16006 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:25 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3495183166-1335081375-3441320851-3591836127
	Account Name:		D054433E-B99F-4F93-9363-1ECDDF1117D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x372C9B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16005 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3495183166-1335081375-3441320851-3591836127
	Account Name:		D054433E-B99F-4F93-9363-1ECDDF1117D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x372C9B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16004 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		D054433E-B99F-4F93-9363-1ECDDF1117D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 16003 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3495183166-1335081375-3441320851-3591836127
	Account Name:		D054433E-B99F-4F93-9363-1ECDDF1117D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x372C52
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 16002 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:24 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3495183166-1335081375-3441320851-3591836127
	Account Name:		D054433E-B99F-4F93-9363-1ECDDF1117D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x372C52
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 16001 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3495183166-1335081375-3441320851-3591836127
	Account Name:		D054433E-B99F-4F93-9363-1ECDDF1117D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x372C52
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 16000 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		D054433E-B99F-4F93-9363-1ECDDF1117D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15999 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3495183166-1335081375-3441320851-3591836127
	Account Name:		D054433E-B99F-4F93-9363-1ECDDF1117D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x372BA9
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15998 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3495183166-1335081375-3441320851-3591836127
	Account Name:		D054433E-B99F-4F93-9363-1ECDDF1117D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x372BA9
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15997 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		D054433E-B99F-4F93-9363-1ECDDF1117D6
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15996 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1294534338-1247116953-345254546-2208187226
	Account Name:		4D2906C2-7E99-4A55-922A-94145A439E83
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3719B9
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15995 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:23 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1294534338-1247116953-345254546-2208187226
	Account Name:		4D2906C2-7E99-4A55-922A-94145A439E83
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3719B9
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15994 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1294534338-1247116953-345254546-2208187226
	Account Name:		4D2906C2-7E99-4A55-922A-94145A439E83
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3719B9
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15993 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		4D2906C2-7E99-4A55-922A-94145A439E83
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15992 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1294534338-1247116953-345254546-2208187226
	Account Name:		4D2906C2-7E99-4A55-922A-94145A439E83
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x370A6B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15991 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:22 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1294534338-1247116953-345254546-2208187226
	Account Name:		4D2906C2-7E99-4A55-922A-94145A439E83
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x370BB7
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15990 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1294534338-1247116953-345254546-2208187226
	Account Name:		4D2906C2-7E99-4A55-922A-94145A439E83
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x370BB7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15989 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		4D2906C2-7E99-4A55-922A-94145A439E83
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15988 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1294534338-1247116953-345254546-2208187226
	Account Name:		4D2906C2-7E99-4A55-922A-94145A439E83
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x370B5E
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15987 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:22 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1294534338-1247116953-345254546-2208187226
	Account Name:		4D2906C2-7E99-4A55-922A-94145A439E83
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x370B5E
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15986 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1294534338-1247116953-345254546-2208187226
	Account Name:		4D2906C2-7E99-4A55-922A-94145A439E83
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x370B5E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15985 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		4D2906C2-7E99-4A55-922A-94145A439E83
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15984 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1294534338-1247116953-345254546-2208187226
	Account Name:		4D2906C2-7E99-4A55-922A-94145A439E83
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x370B11
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15983 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:22 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1294534338-1247116953-345254546-2208187226
	Account Name:		4D2906C2-7E99-4A55-922A-94145A439E83
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x370B11
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15982 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1294534338-1247116953-345254546-2208187226
	Account Name:		4D2906C2-7E99-4A55-922A-94145A439E83
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x370B11
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15981 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		4D2906C2-7E99-4A55-922A-94145A439E83
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15980 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1294534338-1247116953-345254546-2208187226
	Account Name:		4D2906C2-7E99-4A55-922A-94145A439E83
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x370A6B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15979 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1294534338-1247116953-345254546-2208187226
	Account Name:		4D2906C2-7E99-4A55-922A-94145A439E83
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x370A6B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15978 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		4D2906C2-7E99-4A55-922A-94145A439E83
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15977 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-924262910-1134017427-3944278930-2697678322
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x36C6F0
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15976 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:11 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-924262910-1134017427-3944278930-2697678322
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x36C6F0
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15975 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:11 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-924262910-1134017427-3944278930-2697678322
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x36C6F0
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15974 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:11 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15973 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:11 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3858811215-1279802151-2283802249-1684897667
	Account Name:		E600C94F-3B27-4C48-890E-2088837F6D64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x35987B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15972 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:10 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3858811215-1279802151-2283802249-1684897667
	Account Name:		E600C94F-3B27-4C48-890E-2088837F6D64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x36557B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15971 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:05 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3858811215-1279802151-2283802249-1684897667
	Account Name:		E600C94F-3B27-4C48-890E-2088837F6D64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x36557B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15970 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3858811215-1279802151-2283802249-1684897667
	Account Name:		E600C94F-3B27-4C48-890E-2088837F6D64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x36557B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15969 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E600C94F-3B27-4C48-890E-2088837F6D64
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15968 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-924262910-1134017427-3944278930-2697678322
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3638B6
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15967 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:05 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-924262910-1134017427-3944278930-2697678322
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3638B6
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15966 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-924262910-1134017427-3944278930-2697678322
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3638B6
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15965 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15964 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-924262910-1134017427-3944278930-2697678322
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x362458
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15963 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-924262910-1134017427-3944278930-2697678322
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x362ADD
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15962 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-924262910-1134017427-3944278930-2697678322
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x362ADD
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15961 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15960 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-924262910-1134017427-3944278930-2697678322
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x362A43
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15959 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-924262910-1134017427-3944278930-2697678322
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x362A43
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15958 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-924262910-1134017427-3944278930-2697678322
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x362A43
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15957 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15956 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-924262910-1134017427-3944278930-2697678322
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x362822
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15955 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-924262910-1134017427-3944278930-2697678322
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x362822
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15954 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-924262910-1134017427-3944278930-2697678322
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x362822
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15953 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15952 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-924262910-1134017427-3944278930-2697678322
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x362458
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15951 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-924262910-1134017427-3944278930-2697678322
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x362458
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15950 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		371721FE-BB93-4397-92EB-18EBF24DCBA0
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15949 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-356743986-1292746153-3794459548-3694457900
	Account Name:		15437B32-BDA9-4D0D-9CDB-2AE22CF434DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x361262
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15948 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-356743986-1292746153-3794459548-3694457900
	Account Name:		15437B32-BDA9-4D0D-9CDB-2AE22CF434DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x361262
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15947 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-356743986-1292746153-3794459548-3694457900
	Account Name:		15437B32-BDA9-4D0D-9CDB-2AE22CF434DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x361262
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15946 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		15437B32-BDA9-4D0D-9CDB-2AE22CF434DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15945 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:18:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3858811215-1279802151-2283802249-1684897667
	Account Name:		E600C94F-3B27-4C48-890E-2088837F6D64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x35B2FC
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15944 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3858811215-1279802151-2283802249-1684897667
	Account Name:		E600C94F-3B27-4C48-890E-2088837F6D64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x35B2FC
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15943 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3858811215-1279802151-2283802249-1684897667
	Account Name:		E600C94F-3B27-4C48-890E-2088837F6D64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x35B2FC
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15942 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E600C94F-3B27-4C48-890E-2088837F6D64
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15941 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-356743986-1292746153-3794459548-3694457900
	Account Name:		15437B32-BDA9-4D0D-9CDB-2AE22CF434DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x35B251
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15940 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-356743986-1292746153-3794459548-3694457900
	Account Name:		15437B32-BDA9-4D0D-9CDB-2AE22CF434DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x35B251
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15939 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-356743986-1292746153-3794459548-3694457900
	Account Name:		15437B32-BDA9-4D0D-9CDB-2AE22CF434DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x35B251
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15938 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		15437B32-BDA9-4D0D-9CDB-2AE22CF434DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15937 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3858811215-1279802151-2283802249-1684897667
	Account Name:		E600C94F-3B27-4C48-890E-2088837F6D64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3595DF
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15936 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-356743986-1292746153-3794459548-3694457900
	Account Name:		15437B32-BDA9-4D0D-9CDB-2AE22CF434DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x359562
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15935 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3858811215-1279802151-2283802249-1684897667
	Account Name:		E600C94F-3B27-4C48-890E-2088837F6D64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x35987B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15934 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3858811215-1279802151-2283802249-1684897667
	Account Name:		E600C94F-3B27-4C48-890E-2088837F6D64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x35987B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15933 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E600C94F-3B27-4C48-890E-2088837F6D64
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15932 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-356743986-1292746153-3794459548-3694457900
	Account Name:		15437B32-BDA9-4D0D-9CDB-2AE22CF434DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x359818
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15931 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-356743986-1292746153-3794459548-3694457900
	Account Name:		15437B32-BDA9-4D0D-9CDB-2AE22CF434DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x359818
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15930 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		15437B32-BDA9-4D0D-9CDB-2AE22CF434DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15929 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3858811215-1279802151-2283802249-1684897667
	Account Name:		E600C94F-3B27-4C48-890E-2088837F6D64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3597DB
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15928 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3858811215-1279802151-2283802249-1684897667
	Account Name:		E600C94F-3B27-4C48-890E-2088837F6D64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3597DB
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15927 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3858811215-1279802151-2283802249-1684897667
	Account Name:		E600C94F-3B27-4C48-890E-2088837F6D64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3597DB
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15926 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E600C94F-3B27-4C48-890E-2088837F6D64
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15925 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-356743986-1292746153-3794459548-3694457900
	Account Name:		15437B32-BDA9-4D0D-9CDB-2AE22CF434DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x359772
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15924 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3858811215-1279802151-2283802249-1684897667
	Account Name:		E600C94F-3B27-4C48-890E-2088837F6D64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x359729
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15923 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-356743986-1292746153-3794459548-3694457900
	Account Name:		15437B32-BDA9-4D0D-9CDB-2AE22CF434DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x359772
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15922 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-356743986-1292746153-3794459548-3694457900
	Account Name:		15437B32-BDA9-4D0D-9CDB-2AE22CF434DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x359772
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15921 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		15437B32-BDA9-4D0D-9CDB-2AE22CF434DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15920 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3858811215-1279802151-2283802249-1684897667
	Account Name:		E600C94F-3B27-4C48-890E-2088837F6D64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x359729
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15919 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3858811215-1279802151-2283802249-1684897667
	Account Name:		E600C94F-3B27-4C48-890E-2088837F6D64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x359729
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15918 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E600C94F-3B27-4C48-890E-2088837F6D64
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15917 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-356743986-1292746153-3794459548-3694457900
	Account Name:		15437B32-BDA9-4D0D-9CDB-2AE22CF434DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x359684
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15916 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-356743986-1292746153-3794459548-3694457900
	Account Name:		15437B32-BDA9-4D0D-9CDB-2AE22CF434DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x359684
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15915 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-356743986-1292746153-3794459548-3694457900
	Account Name:		15437B32-BDA9-4D0D-9CDB-2AE22CF434DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x359684
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15914 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		15437B32-BDA9-4D0D-9CDB-2AE22CF434DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15913 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3858811215-1279802151-2283802249-1684897667
	Account Name:		E600C94F-3B27-4C48-890E-2088837F6D64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3595DF
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15912 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3858811215-1279802151-2283802249-1684897667
	Account Name:		E600C94F-3B27-4C48-890E-2088837F6D64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3595DF
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15911 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E600C94F-3B27-4C48-890E-2088837F6D64
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15910 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-356743986-1292746153-3794459548-3694457900
	Account Name:		15437B32-BDA9-4D0D-9CDB-2AE22CF434DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x359562
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15909 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-356743986-1292746153-3794459548-3694457900
	Account Name:		15437B32-BDA9-4D0D-9CDB-2AE22CF434DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x359562
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15908 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		15437B32-BDA9-4D0D-9CDB-2AE22CF434DC
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15907 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x349D55
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15906 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:28 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x329C9E
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15905 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:28 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3108043108-1327082052-1758567351-4174619808
	Account Name:		B940F964-AA44-4F19-B79B-D168A0A4D3F8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x34AE7C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15904 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:28 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3108043108-1327082052-1758567351-4174619808
	Account Name:		B940F964-AA44-4F19-B79B-D168A0A4D3F8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x350488
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15903 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:22 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3108043108-1327082052-1758567351-4174619808
	Account Name:		B940F964-AA44-4F19-B79B-D168A0A4D3F8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x350488
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15902 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3108043108-1327082052-1758567351-4174619808
	Account Name:		B940F964-AA44-4F19-B79B-D168A0A4D3F8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x350488
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15901 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		B940F964-AA44-4F19-B79B-D168A0A4D3F8
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15900 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-724234733-1156600059-180888192-250682818
	Account Name:		2B2AF1ED-50FB-44F0-8022-C80AC21DF10E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x25979F
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15899 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:15 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3108043108-1327082052-1758567351-4174619808
	Account Name:		B940F964-AA44-4F19-B79B-D168A0A4D3F8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x34BBB5
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15898 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:12 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3108043108-1327082052-1758567351-4174619808
	Account Name:		B940F964-AA44-4F19-B79B-D168A0A4D3F8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x34BBB5
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15897 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3108043108-1327082052-1758567351-4174619808
	Account Name:		B940F964-AA44-4F19-B79B-D168A0A4D3F8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x34BBB5
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15896 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		B940F964-AA44-4F19-B79B-D168A0A4D3F8
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15895 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3108043108-1327082052-1758567351-4174619808
	Account Name:		B940F964-AA44-4F19-B79B-D168A0A4D3F8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x34ABD6
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15894 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:12 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3108043108-1327082052-1758567351-4174619808
	Account Name:		B940F964-AA44-4F19-B79B-D168A0A4D3F8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x34AE7C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15893 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3108043108-1327082052-1758567351-4174619808
	Account Name:		B940F964-AA44-4F19-B79B-D168A0A4D3F8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x34AE7C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15892 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		B940F964-AA44-4F19-B79B-D168A0A4D3F8
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15891 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3108043108-1327082052-1758567351-4174619808
	Account Name:		B940F964-AA44-4F19-B79B-D168A0A4D3F8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x34ADAC
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15890 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:12 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3108043108-1327082052-1758567351-4174619808
	Account Name:		B940F964-AA44-4F19-B79B-D168A0A4D3F8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x34ADAC
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15889 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3108043108-1327082052-1758567351-4174619808
	Account Name:		B940F964-AA44-4F19-B79B-D168A0A4D3F8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x34ADAC
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15888 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		B940F964-AA44-4F19-B79B-D168A0A4D3F8
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15887 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3108043108-1327082052-1758567351-4174619808
	Account Name:		B940F964-AA44-4F19-B79B-D168A0A4D3F8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x34AD55
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15886 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:12 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3108043108-1327082052-1758567351-4174619808
	Account Name:		B940F964-AA44-4F19-B79B-D168A0A4D3F8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x34AD55
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15885 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3108043108-1327082052-1758567351-4174619808
	Account Name:		B940F964-AA44-4F19-B79B-D168A0A4D3F8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x34AD55
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15884 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		B940F964-AA44-4F19-B79B-D168A0A4D3F8
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15883 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3108043108-1327082052-1758567351-4174619808
	Account Name:		B940F964-AA44-4F19-B79B-D168A0A4D3F8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x34ABD6
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15882 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3108043108-1327082052-1758567351-4174619808
	Account Name:		B940F964-AA44-4F19-B79B-D168A0A4D3F8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x34ABD6
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15881 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		B940F964-AA44-4F19-B79B-D168A0A4D3F8
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15880 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x349D55
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52266
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15879 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x349D55
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15878 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4182909126-1324652237-3610224773-3089707862
	Account Name:		F95220C6-96CD-4EF4-85A8-2FD7563329B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x283B9B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15877 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:08 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x32A5C4
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15876 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x32A5AD
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15875 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x32A596
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15874 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x32A4EC
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15873 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x32A4D7
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15872 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x32A4C0
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15871 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x32A2AE
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15870 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x32A299
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15869 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x32A282
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15868 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x329E75
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15867 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x329E35
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15866 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x329CFD
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15865 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x329CDC
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15864 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x32A64B
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15863 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x32A5EC
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15862 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x329CC5
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15861 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x32A512
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15860 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x329CB4
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15859 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x32A356
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15858 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x329F93
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15857 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x329DA6
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15856 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2075999420-1331326144-3627521437-3665176257
	Account Name:		7BBD3CBC-6CC0-4F5A-9D95-37D8C12676DA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2EFD50
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15855 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:01 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2075999420-1331326144-3627521437-3665176257
	Account Name:		7BBD3CBC-6CC0-4F5A-9D95-37D8C12676DA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2DAEAB
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15854 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:17:01 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-12030748-1183100974-2536447920-1790394388
	Account Name:		00B7931C-B02E-4684-B01F-2F971440B76A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2ABBCD
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15853 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:55 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-526541284-1232230718-1363613316-1145148939
	Account Name:		1F6261E4-593E-4972-8416-47510B964144
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x31161C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15852 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:45 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-833191624-1162528023-1329774229-34926255
	Account Name:		31A97EC8-C517-454A-95BE-424FAFEE1402
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x33F379
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15851 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:45 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-833191624-1162528023-1329774229-34926255
	Account Name:		31A97EC8-C517-454A-95BE-424FAFEE1402
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x33F379
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15850 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-833191624-1162528023-1329774229-34926255
	Account Name:		31A97EC8-C517-454A-95BE-424FAFEE1402
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x33F379
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15849 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		31A97EC8-C517-454A-95BE-424FAFEE1402
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15848 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-833191624-1162528023-1329774229-34926255
	Account Name:		31A97EC8-C517-454A-95BE-424FAFEE1402
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3388DA
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15847 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:39 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-833191624-1162528023-1329774229-34926255
	Account Name:		31A97EC8-C517-454A-95BE-424FAFEE1402
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3388DA
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15846 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-833191624-1162528023-1329774229-34926255
	Account Name:		31A97EC8-C517-454A-95BE-424FAFEE1402
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3388DA
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15845 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		31A97EC8-C517-454A-95BE-424FAFEE1402
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15844 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-833191624-1162528023-1329774229-34926255
	Account Name:		31A97EC8-C517-454A-95BE-424FAFEE1402
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3379B3
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15843 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:38 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-833191624-1162528023-1329774229-34926255
	Account Name:		31A97EC8-C517-454A-95BE-424FAFEE1402
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x337AFE
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15842 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:38 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-833191624-1162528023-1329774229-34926255
	Account Name:		31A97EC8-C517-454A-95BE-424FAFEE1402
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x337AFE
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15841 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:38 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		31A97EC8-C517-454A-95BE-424FAFEE1402
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15840 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:38 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-833191624-1162528023-1329774229-34926255
	Account Name:		31A97EC8-C517-454A-95BE-424FAFEE1402
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x337AA5
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15839 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:38 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-833191624-1162528023-1329774229-34926255
	Account Name:		31A97EC8-C517-454A-95BE-424FAFEE1402
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x337AA5
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15838 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:38 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-833191624-1162528023-1329774229-34926255
	Account Name:		31A97EC8-C517-454A-95BE-424FAFEE1402
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x337AA5
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15837 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:38 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		31A97EC8-C517-454A-95BE-424FAFEE1402
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15836 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:38 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-833191624-1162528023-1329774229-34926255
	Account Name:		31A97EC8-C517-454A-95BE-424FAFEE1402
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x337A5C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15835 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:38 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-833191624-1162528023-1329774229-34926255
	Account Name:		31A97EC8-C517-454A-95BE-424FAFEE1402
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x337A5C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15834 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:38 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-833191624-1162528023-1329774229-34926255
	Account Name:		31A97EC8-C517-454A-95BE-424FAFEE1402
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x337A5C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15833 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:38 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		31A97EC8-C517-454A-95BE-424FAFEE1402
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15832 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:38 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-833191624-1162528023-1329774229-34926255
	Account Name:		31A97EC8-C517-454A-95BE-424FAFEE1402
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3379B3
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15831 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:38 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-833191624-1162528023-1329774229-34926255
	Account Name:		31A97EC8-C517-454A-95BE-424FAFEE1402
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3379B3
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15830 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:38 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		31A97EC8-C517-454A-95BE-424FAFEE1402
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15829 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:38 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-735551800-1283936794-2064424348-2851287517
	Account Name:		2BD7A138-521A-4C87-9C9D-0C7BDD31F3A9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x318D92
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15828 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:24 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1777940767-1226727096-1490516891-3409828557
	Account Name:		69F9391F-5EB8-491E-9B7B-D758CDDA3DCB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x32408B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15827 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:10 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x32A64B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52268
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15826 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x32A64B
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15825 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x32A5EC
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52268
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15824 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x32A5EC
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15823 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x32A5C4
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52267
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15822 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x32A5C4
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15821 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x32A5AD
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52267
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15820 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x32A5AD
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15819 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x32A596
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52267
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15818 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x32A596
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15817 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x32A512
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52268
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15816 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x32A512
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15815 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x32A4EC
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52267
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15814 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x32A4EC
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15813 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x32A4D7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52267
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15812 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x32A4D7
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15811 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x32A4C0
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52267
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15810 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x32A4C0
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15809 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x32A356
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52268
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15808 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x32A356
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15807 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x32A2AE
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52267
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15806 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x32A2AE
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15805 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x32A299
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52267
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15804 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x32A299
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15803 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x32A282
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52267
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15802 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x32A282
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15801 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x329F93
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52268
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15800 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x329F93
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15799 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x329E75
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52267
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15798 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x329E75
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15797 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x329E35
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52267
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15796 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x329E35
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15795 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x329DA6
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52268
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15794 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x329DA6
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15793 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x329CFD
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52267
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15792 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x329CFD
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15791 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x329CDC
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52267
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15790 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x329CDC
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15789 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x329CC5
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52267
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15788 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x329CC5
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15787 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x329CB4
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52267
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15786 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x329CB4
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15785 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x329C9E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52266
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15784 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x329C9E
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15783 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1777940767-1226727096-1490516891-3409828557
	Account Name:		69F9391F-5EB8-491E-9B7B-D758CDDA3DCB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3285CF
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15782 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:05 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1777940767-1226727096-1490516891-3409828557
	Account Name:		69F9391F-5EB8-491E-9B7B-D758CDDA3DCB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3285CF
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15781 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1777940767-1226727096-1490516891-3409828557
	Account Name:		69F9391F-5EB8-491E-9B7B-D758CDDA3DCB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3285CF
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15780 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		69F9391F-5EB8-491E-9B7B-D758CDDA3DCB
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15779 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x320A90
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15778 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:16:00 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x31F957
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15777 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:15:58 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1777940767-1226727096-1490516891-3409828557
	Account Name:		69F9391F-5EB8-491E-9B7B-D758CDDA3DCB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x324F8F
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15776 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:15:58 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1777940767-1226727096-1490516891-3409828557
	Account Name:		69F9391F-5EB8-491E-9B7B-D758CDDA3DCB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x324F8F
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15775 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:15:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1777940767-1226727096-1490516891-3409828557
	Account Name:		69F9391F-5EB8-491E-9B7B-D758CDDA3DCB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x324F8F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15774 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:15:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		69F9391F-5EB8-491E-9B7B-D758CDDA3DCB
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15773 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:15:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1777940767-1226727096-1490516891-3409828557
	Account Name:		69F9391F-5EB8-491E-9B7B-D758CDDA3DCB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x323EC7
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15772 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:15:57 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1777940767-1226727096-1490516891-3409828557
	Account Name:		69F9391F-5EB8-491E-9B7B-D758CDDA3DCB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x32408B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15771 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:15:57 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1777940767-1226727096-1490516891-3409828557
	Account Name:		69F9391F-5EB8-491E-9B7B-D758CDDA3DCB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x32408B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15770 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:15:57 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		69F9391F-5EB8-491E-9B7B-D758CDDA3DCB
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15769 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:15:57 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1777940767-1226727096-1490516891-3409828557
	Account Name:		69F9391F-5EB8-491E-9B7B-D758CDDA3DCB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x324032
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15768 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:15:57 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1777940767-1226727096-1490516891-3409828557
	Account Name:		69F9391F-5EB8-491E-9B7B-D758CDDA3DCB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x324032
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15767 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:15:57 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1777940767-1226727096-1490516891-3409828557
	Account Name:		69F9391F-5EB8-491E-9B7B-D758CDDA3DCB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x324032
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15766 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:15:57 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		69F9391F-5EB8-491E-9B7B-D758CDDA3DCB
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15765 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:15:57 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1777940767-1226727096-1490516891-3409828557
	Account Name:		69F9391F-5EB8-491E-9B7B-D758CDDA3DCB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x323FE9
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15764 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:15:57 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1777940767-1226727096-1490516891-3409828557
	Account Name:		69F9391F-5EB8-491E-9B7B-D758CDDA3DCB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x323FE9
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15763 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:15:57 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1777940767-1226727096-1490516891-3409828557
	Account Name:		69F9391F-5EB8-491E-9B7B-D758CDDA3DCB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x323FE9
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15762 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:15:57 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		69F9391F-5EB8-491E-9B7B-D758CDDA3DCB
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15761 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:15:57 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1777940767-1226727096-1490516891-3409828557
	Account Name:		69F9391F-5EB8-491E-9B7B-D758CDDA3DCB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x323EC7
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15760 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:15:57 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1777940767-1226727096-1490516891-3409828557
	Account Name:		69F9391F-5EB8-491E-9B7B-D758CDDA3DCB
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x323EC7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15759 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:15:57 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		69F9391F-5EB8-491E-9B7B-D758CDDA3DCB
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15758 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:15:57 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x320A90
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{07A26218-EC88-882C-1A5C-3DFA8432F918}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52246
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15757 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:15:17 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x320A90
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15756 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:15:17 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x31F957
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52243
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15755 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:15:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x31F957
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15754 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:15:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-735551800-1283936794-2064424348-2851287517
	Account Name:		2BD7A138-521A-4C87-9C9D-0C7BDD31F3A9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x31EE99
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15753 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:15:08 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-735551800-1283936794-2064424348-2851287517
	Account Name:		2BD7A138-521A-4C87-9C9D-0C7BDD31F3A9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x31EE99
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15752 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:15:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-735551800-1283936794-2064424348-2851287517
	Account Name:		2BD7A138-521A-4C87-9C9D-0C7BDD31F3A9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x31EE99
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15751 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:15:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		2BD7A138-521A-4C87-9C9D-0C7BDD31F3A9
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15750 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:15:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-735551800-1283936794-2064424348-2851287517
	Account Name:		2BD7A138-521A-4C87-9C9D-0C7BDD31F3A9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x31AEBA
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15749 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:53 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-735551800-1283936794-2064424348-2851287517
	Account Name:		2BD7A138-521A-4C87-9C9D-0C7BDD31F3A9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x31AEBA
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15748 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-735551800-1283936794-2064424348-2851287517
	Account Name:		2BD7A138-521A-4C87-9C9D-0C7BDD31F3A9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x31AEBA
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15747 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		2BD7A138-521A-4C87-9C9D-0C7BDD31F3A9
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15746 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-735551800-1283936794-2064424348-2851287517
	Account Name:		2BD7A138-521A-4C87-9C9D-0C7BDD31F3A9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x318C2E
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15745 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:48 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-735551800-1283936794-2064424348-2851287517
	Account Name:		2BD7A138-521A-4C87-9C9D-0C7BDD31F3A9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x318D92
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15744 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:48 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-735551800-1283936794-2064424348-2851287517
	Account Name:		2BD7A138-521A-4C87-9C9D-0C7BDD31F3A9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x318D92
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15743 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:48 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		2BD7A138-521A-4C87-9C9D-0C7BDD31F3A9
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15742 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:48 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-735551800-1283936794-2064424348-2851287517
	Account Name:		2BD7A138-521A-4C87-9C9D-0C7BDD31F3A9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x318D39
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15741 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:48 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-735551800-1283936794-2064424348-2851287517
	Account Name:		2BD7A138-521A-4C87-9C9D-0C7BDD31F3A9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x318D39
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15740 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:48 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-735551800-1283936794-2064424348-2851287517
	Account Name:		2BD7A138-521A-4C87-9C9D-0C7BDD31F3A9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x318D39
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15739 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:48 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		2BD7A138-521A-4C87-9C9D-0C7BDD31F3A9
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15738 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:48 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-735551800-1283936794-2064424348-2851287517
	Account Name:		2BD7A138-521A-4C87-9C9D-0C7BDD31F3A9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x318CEF
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15737 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:48 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-735551800-1283936794-2064424348-2851287517
	Account Name:		2BD7A138-521A-4C87-9C9D-0C7BDD31F3A9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x318CEF
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15736 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:48 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-735551800-1283936794-2064424348-2851287517
	Account Name:		2BD7A138-521A-4C87-9C9D-0C7BDD31F3A9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x318CEF
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15735 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:48 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		2BD7A138-521A-4C87-9C9D-0C7BDD31F3A9
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15734 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:48 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-735551800-1283936794-2064424348-2851287517
	Account Name:		2BD7A138-521A-4C87-9C9D-0C7BDD31F3A9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x318C2E
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15733 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:48 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-735551800-1283936794-2064424348-2851287517
	Account Name:		2BD7A138-521A-4C87-9C9D-0C7BDD31F3A9
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x318C2E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15732 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:48 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		2BD7A138-521A-4C87-9C9D-0C7BDD31F3A9
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15731 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:48 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-526541284-1232230718-1363613316-1145148939
	Account Name:		1F6261E4-593E-4972-8416-47510B964144
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3159B0
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15730 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:40 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-526541284-1232230718-1363613316-1145148939
	Account Name:		1F6261E4-593E-4972-8416-47510B964144
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3159B0
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15729 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-526541284-1232230718-1363613316-1145148939
	Account Name:		1F6261E4-593E-4972-8416-47510B964144
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3159B0
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15728 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1F6261E4-593E-4972-8416-47510B964144
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15727 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-526541284-1232230718-1363613316-1145148939
	Account Name:		1F6261E4-593E-4972-8416-47510B964144
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3124A8
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15726 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:33 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-526541284-1232230718-1363613316-1145148939
	Account Name:		1F6261E4-593E-4972-8416-47510B964144
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3124A8
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15725 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-526541284-1232230718-1363613316-1145148939
	Account Name:		1F6261E4-593E-4972-8416-47510B964144
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3124A8
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15724 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1F6261E4-593E-4972-8416-47510B964144
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15723 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-526541284-1232230718-1363613316-1145148939
	Account Name:		1F6261E4-593E-4972-8416-47510B964144
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3114CD
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15722 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:32 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-526541284-1232230718-1363613316-1145148939
	Account Name:		1F6261E4-593E-4972-8416-47510B964144
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x31161C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15721 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-526541284-1232230718-1363613316-1145148939
	Account Name:		1F6261E4-593E-4972-8416-47510B964144
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x31161C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15720 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1F6261E4-593E-4972-8416-47510B964144
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15719 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-526541284-1232230718-1363613316-1145148939
	Account Name:		1F6261E4-593E-4972-8416-47510B964144
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3115BF
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15718 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:32 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-526541284-1232230718-1363613316-1145148939
	Account Name:		1F6261E4-593E-4972-8416-47510B964144
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3115BF
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15717 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-526541284-1232230718-1363613316-1145148939
	Account Name:		1F6261E4-593E-4972-8416-47510B964144
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3115BF
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15716 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1F6261E4-593E-4972-8416-47510B964144
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15715 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-526541284-1232230718-1363613316-1145148939
	Account Name:		1F6261E4-593E-4972-8416-47510B964144
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x311576
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15714 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:32 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-526541284-1232230718-1363613316-1145148939
	Account Name:		1F6261E4-593E-4972-8416-47510B964144
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x311576
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15713 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-526541284-1232230718-1363613316-1145148939
	Account Name:		1F6261E4-593E-4972-8416-47510B964144
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x311576
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15712 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1F6261E4-593E-4972-8416-47510B964144
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15711 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-526541284-1232230718-1363613316-1145148939
	Account Name:		1F6261E4-593E-4972-8416-47510B964144
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3114CD
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15710 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-526541284-1232230718-1363613316-1145148939
	Account Name:		1F6261E4-593E-4972-8416-47510B964144
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3114CD
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15709 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1F6261E4-593E-4972-8416-47510B964144
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15708 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2F20DA
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15707 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:28 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2DFCDE
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15706 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:28 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2346780509-1286027145-1576454068-4293860922
	Account Name:		8BE1075D-3789-4CA7-B4C7-F65D3A1EEFFF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x302779
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15705 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:17 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2DFD36
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15704 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2DFD1F
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15703 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2DFD08
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15702 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2DFCF7
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15701 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2DFEAC
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15700 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:14:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2346780509-1286027145-1576454068-4293860922
	Account Name:		8BE1075D-3789-4CA7-B4C7-F65D3A1EEFFF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x306A7A
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15699 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:46 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2346780509-1286027145-1576454068-4293860922
	Account Name:		8BE1075D-3789-4CA7-B4C7-F65D3A1EEFFF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x306A7A
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15698 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2346780509-1286027145-1576454068-4293860922
	Account Name:		8BE1075D-3789-4CA7-B4C7-F65D3A1EEFFF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x306A7A
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15697 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		8BE1075D-3789-4CA7-B4C7-F65D3A1EEFFF
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15696 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2346780509-1286027145-1576454068-4293860922
	Account Name:		8BE1075D-3789-4CA7-B4C7-F65D3A1EEFFF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x303528
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15695 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:37 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2346780509-1286027145-1576454068-4293860922
	Account Name:		8BE1075D-3789-4CA7-B4C7-F65D3A1EEFFF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x303528
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15694 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2346780509-1286027145-1576454068-4293860922
	Account Name:		8BE1075D-3789-4CA7-B4C7-F65D3A1EEFFF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x303528
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15693 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		8BE1075D-3789-4CA7-B4C7-F65D3A1EEFFF
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15692 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2346780509-1286027145-1576454068-4293860922
	Account Name:		8BE1075D-3789-4CA7-B4C7-F65D3A1EEFFF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x302629
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15691 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:37 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2346780509-1286027145-1576454068-4293860922
	Account Name:		8BE1075D-3789-4CA7-B4C7-F65D3A1EEFFF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x302779
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15690 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2346780509-1286027145-1576454068-4293860922
	Account Name:		8BE1075D-3789-4CA7-B4C7-F65D3A1EEFFF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x302779
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15689 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		8BE1075D-3789-4CA7-B4C7-F65D3A1EEFFF
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15688 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2346780509-1286027145-1576454068-4293860922
	Account Name:		8BE1075D-3789-4CA7-B4C7-F65D3A1EEFFF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x30271C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15687 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:37 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2346780509-1286027145-1576454068-4293860922
	Account Name:		8BE1075D-3789-4CA7-B4C7-F65D3A1EEFFF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x30271C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15686 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2346780509-1286027145-1576454068-4293860922
	Account Name:		8BE1075D-3789-4CA7-B4C7-F65D3A1EEFFF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x30271C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15685 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		8BE1075D-3789-4CA7-B4C7-F65D3A1EEFFF
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15684 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2346780509-1286027145-1576454068-4293860922
	Account Name:		8BE1075D-3789-4CA7-B4C7-F65D3A1EEFFF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3026D3
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15683 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:37 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2346780509-1286027145-1576454068-4293860922
	Account Name:		8BE1075D-3789-4CA7-B4C7-F65D3A1EEFFF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3026D3
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15682 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2346780509-1286027145-1576454068-4293860922
	Account Name:		8BE1075D-3789-4CA7-B4C7-F65D3A1EEFFF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x3026D3
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15681 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		8BE1075D-3789-4CA7-B4C7-F65D3A1EEFFF
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15680 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2346780509-1286027145-1576454068-4293860922
	Account Name:		8BE1075D-3789-4CA7-B4C7-F65D3A1EEFFF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x302629
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15679 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2346780509-1286027145-1576454068-4293860922
	Account Name:		8BE1075D-3789-4CA7-B4C7-F65D3A1EEFFF
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x302629
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15678 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		8BE1075D-3789-4CA7-B4C7-F65D3A1EEFFF
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15677 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2036156644-1151820349-3396086666-2800140608
	Account Name:		795D48E4-623D-44A7-8A2B-6CCA40C1E6A6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2C3A60
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15676 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:23 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2036156644-1151820349-3396086666-2800140608
	Account Name:		795D48E4-623D-44A7-8A2B-6CCA40C1E6A6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2FBFC0
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15675 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:21 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2036156644-1151820349-3396086666-2800140608
	Account Name:		795D48E4-623D-44A7-8A2B-6CCA40C1E6A6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2FBFC0
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15674 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2036156644-1151820349-3396086666-2800140608
	Account Name:		795D48E4-623D-44A7-8A2B-6CCA40C1E6A6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2FBFC0
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15673 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		795D48E4-623D-44A7-8A2B-6CCA40C1E6A6
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15672 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2DF94D
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15671 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:17 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2E2719
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15670 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:17 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2E14EB
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15669 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:12 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-370108323-1173251456-266501542-1613776357
	Account Name:		160F67A3-6580-45EE-A67D-E20FE5453060
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2CE22D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15668 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:11 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-859456726-1148465227-1318487983-3732830262
	Account Name:		333A44D6-304B-4474-AF87-964E36787EDE
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2D22F1
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15667 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:10 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x2F20DA
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52197
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15666 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2F20DA
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15665 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2E0B54
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15664 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:02 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2075999420-1331326144-3627521437-3665176257
	Account Name:		7BBD3CBC-6CC0-4F5A-9D95-37D8C12676DA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2EFD50
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15663 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2075999420-1331326144-3627521437-3665176257
	Account Name:		7BBD3CBC-6CC0-4F5A-9D95-37D8C12676DA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2EFD50
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15662 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		7BBD3CBC-6CC0-4F5A-9D95-37D8C12676DA
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15661 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1015277921-1330459547-3248943788-1649603790
	Account Name:		3C83E961-339B-4F4D-ACF2-A6C1CEF45262
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2D00D0
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15660 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:13:01 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2E8158
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15659 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:58 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x2E8158
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15658 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2E8158
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15657 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2075999420-1331326144-3627521437-3665176257
	Account Name:		7BBD3CBC-6CC0-4F5A-9D95-37D8C12676DA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2E7D99
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15656 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:58 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2075999420-1331326144-3627521437-3665176257
	Account Name:		7BBD3CBC-6CC0-4F5A-9D95-37D8C12676DA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2E7D99
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15655 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2075999420-1331326144-3627521437-3665176257
	Account Name:		7BBD3CBC-6CC0-4F5A-9D95-37D8C12676DA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2E7D99
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15654 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		7BBD3CBC-6CC0-4F5A-9D95-37D8C12676DA
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15653 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2075999420-1331326144-3627521437-3665176257
	Account Name:		7BBD3CBC-6CC0-4F5A-9D95-37D8C12676DA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2E796D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15652 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:58 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2075999420-1331326144-3627521437-3665176257
	Account Name:		7BBD3CBC-6CC0-4F5A-9D95-37D8C12676DA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2E796D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15651 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2075999420-1331326144-3627521437-3665176257
	Account Name:		7BBD3CBC-6CC0-4F5A-9D95-37D8C12676DA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2E796D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15650 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		7BBD3CBC-6CC0-4F5A-9D95-37D8C12676DA
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15649 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:58 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15648 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:57 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15647 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:57 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2E2997
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15646 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:57 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2E29C5
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15645 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:57 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2E29AF
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15644 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:57 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		No
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x2E29C5
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{75E95A91-9AA9-D256-E865-53DA2283A231}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52196
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15643 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:57 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		No
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x2E29AF
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{75E95A91-9AA9-D256-E865-53DA2283A231}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52195
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15642 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:57 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		No
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x2E2997
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{75E95A91-9AA9-D256-E865-53DA2283A231}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52194
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15641 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:57 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		No
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x2E2719
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{75E95A91-9AA9-D256-E865-53DA2283A231}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52193
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15640 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:57 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-859456726-1148465227-1318487983-3732830262
	Account Name:		333A44D6-304B-4474-AF87-964E36787EDE
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2E1C5B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15639 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-859456726-1148465227-1318487983-3732830262
	Account Name:		333A44D6-304B-4474-AF87-964E36787EDE
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2E1C5B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15638 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-859456726-1148465227-1318487983-3732830262
	Account Name:		333A44D6-304B-4474-AF87-964E36787EDE
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2E1C5B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15637 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		333A44D6-304B-4474-AF87-964E36787EDE
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15636 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		No
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x2E14EB
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{0631BBD8-6A81-A0A2-F1CB-363B0C7185B2}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52193
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15635 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2E0BA8
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15634 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		No
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x2E0BA8
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{0631BBD8-6A81-A0A2-F1CB-363B0C7185B2}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15633 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x2E0B54
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15632 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2E0B54
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15631 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x2DFEAC
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52199
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15630 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2DFEAC
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15629 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x2DFD36
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52198
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15628 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2DFD36
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15627 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x2DFD1F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52198
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15626 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2DFD1F
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15625 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x2DFD08
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52198
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15624 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2DFD08
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15623 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x2DFCF7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52198
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15622 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2DFCF7
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15621 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x2DFCDE
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52197
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15620 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2DFCDE
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15619 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2DF9AB
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15618 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2DF9A0
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15617 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2DF982
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15616 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x2DF9AB
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{07A26218-EC88-882C-1A5C-3DFA8432F918}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52196
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15615 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x2DF9A0
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{07A26218-EC88-882C-1A5C-3DFA8432F918}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52195
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15614 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2DF9AB
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15613 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2DF9A0
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15612 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x2DF982
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{07A26218-EC88-882C-1A5C-3DFA8432F918}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52194
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15611 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2DF982
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15610 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x2DF94D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{07A26218-EC88-882C-1A5C-3DFA8432F918}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52193
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15609 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2DF94D
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15608 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:56 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1015277921-1330459547-3248943788-1649603790
	Account Name:		3C83E961-339B-4F4D-ACF2-A6C1CEF45262
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2DDAA2
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15607 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:53 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1015277921-1330459547-3248943788-1649603790
	Account Name:		3C83E961-339B-4F4D-ACF2-A6C1CEF45262
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2DDAA2
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15606 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1015277921-1330459547-3248943788-1649603790
	Account Name:		3C83E961-339B-4F4D-ACF2-A6C1CEF45262
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2DDAA2
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15605 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		3C83E961-339B-4F4D-ACF2-A6C1CEF45262
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15604 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2DAE15
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15603 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:52 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2075999420-1331326144-3627521437-3665176257
	Account Name:		7BBD3CBC-6CC0-4F5A-9D95-37D8C12676DA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2DB055
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15602 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:52 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2075999420-1331326144-3627521437-3665176257
	Account Name:		7BBD3CBC-6CC0-4F5A-9D95-37D8C12676DA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2DB055
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15601 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:52 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2075999420-1331326144-3627521437-3665176257
	Account Name:		7BBD3CBC-6CC0-4F5A-9D95-37D8C12676DA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2DB055
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15600 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:52 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		7BBD3CBC-6CC0-4F5A-9D95-37D8C12676DA
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15599 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:52 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2075999420-1331326144-3627521437-3665176257
	Account Name:		7BBD3CBC-6CC0-4F5A-9D95-37D8C12676DA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2DAEAB
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15598 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:52 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2075999420-1331326144-3627521437-3665176257
	Account Name:		7BBD3CBC-6CC0-4F5A-9D95-37D8C12676DA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2DAEAB
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15597 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:52 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		7BBD3CBC-6CC0-4F5A-9D95-37D8C12676DA
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15596 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:52 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x2DAE15
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{1E5B6BDB-D4C3-123C-4E47-6785FFC0ED75}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	
		RestrictedKrbHost/chh2-832929-1@CBCI-832929-1.LOCAL
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15595 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:52 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2DAE15
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15594 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:52 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-370108323-1173251456-266501542-1613776357
	Account Name:		160F67A3-6580-45EE-A67D-E20FE5453060
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2D7D35
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15593 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:51 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-370108323-1173251456-266501542-1613776357
	Account Name:		160F67A3-6580-45EE-A67D-E20FE5453060
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2D7D35
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15592 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:51 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-370108323-1173251456-266501542-1613776357
	Account Name:		160F67A3-6580-45EE-A67D-E20FE5453060
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2D7D35
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15591 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:51 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		160F67A3-6580-45EE-A67D-E20FE5453060
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15590 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:51 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-859456726-1148465227-1318487983-3732830262
	Account Name:		333A44D6-304B-4474-AF87-964E36787EDE
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2D3737
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15589 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:48 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-859456726-1148465227-1318487983-3732830262
	Account Name:		333A44D6-304B-4474-AF87-964E36787EDE
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2D3737
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15588 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:48 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-859456726-1148465227-1318487983-3732830262
	Account Name:		333A44D6-304B-4474-AF87-964E36787EDE
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2D3737
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15587 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:48 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		333A44D6-304B-4474-AF87-964E36787EDE
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15586 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:48 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-859456726-1148465227-1318487983-3732830262
	Account Name:		333A44D6-304B-4474-AF87-964E36787EDE
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2D21AA
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15585 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:47 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-859456726-1148465227-1318487983-3732830262
	Account Name:		333A44D6-304B-4474-AF87-964E36787EDE
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2D22F1
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15584 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-859456726-1148465227-1318487983-3732830262
	Account Name:		333A44D6-304B-4474-AF87-964E36787EDE
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2D22F1
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15583 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		333A44D6-304B-4474-AF87-964E36787EDE
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15582 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-859456726-1148465227-1318487983-3732830262
	Account Name:		333A44D6-304B-4474-AF87-964E36787EDE
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2D2298
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15581 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:47 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-859456726-1148465227-1318487983-3732830262
	Account Name:		333A44D6-304B-4474-AF87-964E36787EDE
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2D2298
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15580 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-859456726-1148465227-1318487983-3732830262
	Account Name:		333A44D6-304B-4474-AF87-964E36787EDE
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2D2298
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15579 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		333A44D6-304B-4474-AF87-964E36787EDE
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15578 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-859456726-1148465227-1318487983-3732830262
	Account Name:		333A44D6-304B-4474-AF87-964E36787EDE
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2D224F
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15577 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:47 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-859456726-1148465227-1318487983-3732830262
	Account Name:		333A44D6-304B-4474-AF87-964E36787EDE
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2D224F
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15576 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-859456726-1148465227-1318487983-3732830262
	Account Name:		333A44D6-304B-4474-AF87-964E36787EDE
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2D224F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15575 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		333A44D6-304B-4474-AF87-964E36787EDE
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15574 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-859456726-1148465227-1318487983-3732830262
	Account Name:		333A44D6-304B-4474-AF87-964E36787EDE
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2D21AA
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15573 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-859456726-1148465227-1318487983-3732830262
	Account Name:		333A44D6-304B-4474-AF87-964E36787EDE
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2D21AA
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15572 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		333A44D6-304B-4474-AF87-964E36787EDE
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15571 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1015277921-1330459547-3248943788-1649603790
	Account Name:		3C83E961-339B-4F4D-ACF2-A6C1CEF45262
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2D1467
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15570 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:47 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1015277921-1330459547-3248943788-1649603790
	Account Name:		3C83E961-339B-4F4D-ACF2-A6C1CEF45262
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2D1467
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15569 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1015277921-1330459547-3248943788-1649603790
	Account Name:		3C83E961-339B-4F4D-ACF2-A6C1CEF45262
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2D1467
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15568 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		3C83E961-339B-4F4D-ACF2-A6C1CEF45262
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15567 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1015277921-1330459547-3248943788-1649603790
	Account Name:		3C83E961-339B-4F4D-ACF2-A6C1CEF45262
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2CFF7B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15566 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:46 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1015277921-1330459547-3248943788-1649603790
	Account Name:		3C83E961-339B-4F4D-ACF2-A6C1CEF45262
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2D00D0
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15565 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1015277921-1330459547-3248943788-1649603790
	Account Name:		3C83E961-339B-4F4D-ACF2-A6C1CEF45262
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2D00D0
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15564 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		3C83E961-339B-4F4D-ACF2-A6C1CEF45262
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15563 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1015277921-1330459547-3248943788-1649603790
	Account Name:		3C83E961-339B-4F4D-ACF2-A6C1CEF45262
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2D0077
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15562 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:46 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1015277921-1330459547-3248943788-1649603790
	Account Name:		3C83E961-339B-4F4D-ACF2-A6C1CEF45262
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2D0077
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15561 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1015277921-1330459547-3248943788-1649603790
	Account Name:		3C83E961-339B-4F4D-ACF2-A6C1CEF45262
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2D0077
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15560 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		3C83E961-339B-4F4D-ACF2-A6C1CEF45262
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15559 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1015277921-1330459547-3248943788-1649603790
	Account Name:		3C83E961-339B-4F4D-ACF2-A6C1CEF45262
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2D0028
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15558 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:46 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1015277921-1330459547-3248943788-1649603790
	Account Name:		3C83E961-339B-4F4D-ACF2-A6C1CEF45262
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2D0028
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15557 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1015277921-1330459547-3248943788-1649603790
	Account Name:		3C83E961-339B-4F4D-ACF2-A6C1CEF45262
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2D0028
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15556 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		3C83E961-339B-4F4D-ACF2-A6C1CEF45262
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15555 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1015277921-1330459547-3248943788-1649603790
	Account Name:		3C83E961-339B-4F4D-ACF2-A6C1CEF45262
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2CFF7B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15554 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1015277921-1330459547-3248943788-1649603790
	Account Name:		3C83E961-339B-4F4D-ACF2-A6C1CEF45262
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2CFF7B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15553 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		3C83E961-339B-4F4D-ACF2-A6C1CEF45262
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15552 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-370108323-1173251456-266501542-1613776357
	Account Name:		160F67A3-6580-45EE-A67D-E20FE5453060
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2CF0C8
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15551 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:45 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-370108323-1173251456-266501542-1613776357
	Account Name:		160F67A3-6580-45EE-A67D-E20FE5453060
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2CF0C8
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15550 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-370108323-1173251456-266501542-1613776357
	Account Name:		160F67A3-6580-45EE-A67D-E20FE5453060
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2CF0C8
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15549 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		160F67A3-6580-45EE-A67D-E20FE5453060
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15548 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-370108323-1173251456-266501542-1613776357
	Account Name:		160F67A3-6580-45EE-A67D-E20FE5453060
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2CE0DE
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15547 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:44 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-370108323-1173251456-266501542-1613776357
	Account Name:		160F67A3-6580-45EE-A67D-E20FE5453060
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2CE22D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15546 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-370108323-1173251456-266501542-1613776357
	Account Name:		160F67A3-6580-45EE-A67D-E20FE5453060
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2CE22D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15545 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		160F67A3-6580-45EE-A67D-E20FE5453060
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15544 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-370108323-1173251456-266501542-1613776357
	Account Name:		160F67A3-6580-45EE-A67D-E20FE5453060
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2CE1D0
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15543 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:44 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-370108323-1173251456-266501542-1613776357
	Account Name:		160F67A3-6580-45EE-A67D-E20FE5453060
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2CE1D0
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15542 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-370108323-1173251456-266501542-1613776357
	Account Name:		160F67A3-6580-45EE-A67D-E20FE5453060
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2CE1D0
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15541 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		160F67A3-6580-45EE-A67D-E20FE5453060
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15540 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-370108323-1173251456-266501542-1613776357
	Account Name:		160F67A3-6580-45EE-A67D-E20FE5453060
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2CE187
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15539 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:44 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-370108323-1173251456-266501542-1613776357
	Account Name:		160F67A3-6580-45EE-A67D-E20FE5453060
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2CE187
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15538 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-370108323-1173251456-266501542-1613776357
	Account Name:		160F67A3-6580-45EE-A67D-E20FE5453060
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2CE187
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15537 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		160F67A3-6580-45EE-A67D-E20FE5453060
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15536 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-370108323-1173251456-266501542-1613776357
	Account Name:		160F67A3-6580-45EE-A67D-E20FE5453060
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2CE0DE
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15535 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-370108323-1173251456-266501542-1613776357
	Account Name:		160F67A3-6580-45EE-A67D-E20FE5453060
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2CE0DE
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15534 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		160F67A3-6580-45EE-A67D-E20FE5453060
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15533 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2036156644-1151820349-3396086666-2800140608
	Account Name:		795D48E4-623D-44A7-8A2B-6CCA40C1E6A6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2C9126
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15532 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:28 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2036156644-1151820349-3396086666-2800140608
	Account Name:		795D48E4-623D-44A7-8A2B-6CCA40C1E6A6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2C9126
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15531 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:28 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2036156644-1151820349-3396086666-2800140608
	Account Name:		795D48E4-623D-44A7-8A2B-6CCA40C1E6A6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2C9126
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15530 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:28 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		795D48E4-623D-44A7-8A2B-6CCA40C1E6A6
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15529 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:28 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2036156644-1151820349-3396086666-2800140608
	Account Name:		795D48E4-623D-44A7-8A2B-6CCA40C1E6A6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2C5351
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15528 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:23 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2036156644-1151820349-3396086666-2800140608
	Account Name:		795D48E4-623D-44A7-8A2B-6CCA40C1E6A6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2C5351
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15527 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2036156644-1151820349-3396086666-2800140608
	Account Name:		795D48E4-623D-44A7-8A2B-6CCA40C1E6A6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2C5351
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15526 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		795D48E4-623D-44A7-8A2B-6CCA40C1E6A6
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15525 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3405941255-1200673726-3802040461-2828403934
	Account Name:		CB028A07-D3BE-4790-8D88-9EE2DE0496A8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2B509E
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15524 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:22 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2036156644-1151820349-3396086666-2800140608
	Account Name:		795D48E4-623D-44A7-8A2B-6CCA40C1E6A6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2C3412
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15523 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:22 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2036156644-1151820349-3396086666-2800140608
	Account Name:		795D48E4-623D-44A7-8A2B-6CCA40C1E6A6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2C3A60
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15522 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2036156644-1151820349-3396086666-2800140608
	Account Name:		795D48E4-623D-44A7-8A2B-6CCA40C1E6A6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2C3A60
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15521 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		795D48E4-623D-44A7-8A2B-6CCA40C1E6A6
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15520 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2036156644-1151820349-3396086666-2800140608
	Account Name:		795D48E4-623D-44A7-8A2B-6CCA40C1E6A6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2C3846
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15519 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:22 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2036156644-1151820349-3396086666-2800140608
	Account Name:		795D48E4-623D-44A7-8A2B-6CCA40C1E6A6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2C3846
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15518 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2036156644-1151820349-3396086666-2800140608
	Account Name:		795D48E4-623D-44A7-8A2B-6CCA40C1E6A6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2C3846
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15517 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		795D48E4-623D-44A7-8A2B-6CCA40C1E6A6
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15516 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2036156644-1151820349-3396086666-2800140608
	Account Name:		795D48E4-623D-44A7-8A2B-6CCA40C1E6A6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2C36D5
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15515 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:22 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2036156644-1151820349-3396086666-2800140608
	Account Name:		795D48E4-623D-44A7-8A2B-6CCA40C1E6A6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2C36D5
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15514 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2036156644-1151820349-3396086666-2800140608
	Account Name:		795D48E4-623D-44A7-8A2B-6CCA40C1E6A6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2C36D5
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15513 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		795D48E4-623D-44A7-8A2B-6CCA40C1E6A6
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15512 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2036156644-1151820349-3396086666-2800140608
	Account Name:		795D48E4-623D-44A7-8A2B-6CCA40C1E6A6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2C3412
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15511 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2036156644-1151820349-3396086666-2800140608
	Account Name:		795D48E4-623D-44A7-8A2B-6CCA40C1E6A6
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2C3412
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15510 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		795D48E4-623D-44A7-8A2B-6CCA40C1E6A6
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15509 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3405941255-1200673726-3802040461-2828403934
	Account Name:		CB028A07-D3BE-4790-8D88-9EE2DE0496A8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2BD86B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15508 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:15 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3405941255-1200673726-3802040461-2828403934
	Account Name:		CB028A07-D3BE-4790-8D88-9EE2DE0496A8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2BD86B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15507 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:15 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3405941255-1200673726-3802040461-2828403934
	Account Name:		CB028A07-D3BE-4790-8D88-9EE2DE0496A8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2BD86B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15506 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:15 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		CB028A07-D3BE-4790-8D88-9EE2DE0496A8
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15505 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:15 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-519991461-1219222095-2266155947-1188268808
	Account Name:		1EFE70A5-DA4F-48AB-ABCB-1287088BD346
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2A9A42
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15504 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:11 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3405941255-1200673726-3802040461-2828403934
	Account Name:		CB028A07-D3BE-4790-8D88-9EE2DE0496A8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2B6649
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15503 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:10 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3405941255-1200673726-3802040461-2828403934
	Account Name:		CB028A07-D3BE-4790-8D88-9EE2DE0496A8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2B6649
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15502 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3405941255-1200673726-3802040461-2828403934
	Account Name:		CB028A07-D3BE-4790-8D88-9EE2DE0496A8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2B6649
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15501 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		CB028A07-D3BE-4790-8D88-9EE2DE0496A8
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15500 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3405941255-1200673726-3802040461-2828403934
	Account Name:		CB028A07-D3BE-4790-8D88-9EE2DE0496A8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2B4C1A
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15499 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:09 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3405941255-1200673726-3802040461-2828403934
	Account Name:		CB028A07-D3BE-4790-8D88-9EE2DE0496A8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2B509E
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15498 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3405941255-1200673726-3802040461-2828403934
	Account Name:		CB028A07-D3BE-4790-8D88-9EE2DE0496A8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2B509E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15497 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		CB028A07-D3BE-4790-8D88-9EE2DE0496A8
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15496 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3405941255-1200673726-3802040461-2828403934
	Account Name:		CB028A07-D3BE-4790-8D88-9EE2DE0496A8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2B4EAB
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15495 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:09 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3405941255-1200673726-3802040461-2828403934
	Account Name:		CB028A07-D3BE-4790-8D88-9EE2DE0496A8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2B4EAB
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15494 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3405941255-1200673726-3802040461-2828403934
	Account Name:		CB028A07-D3BE-4790-8D88-9EE2DE0496A8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2B4EAB
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15493 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		CB028A07-D3BE-4790-8D88-9EE2DE0496A8
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15492 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3405941255-1200673726-3802040461-2828403934
	Account Name:		CB028A07-D3BE-4790-8D88-9EE2DE0496A8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2B4D8D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15491 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:09 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3405941255-1200673726-3802040461-2828403934
	Account Name:		CB028A07-D3BE-4790-8D88-9EE2DE0496A8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2B4D8D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15490 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3405941255-1200673726-3802040461-2828403934
	Account Name:		CB028A07-D3BE-4790-8D88-9EE2DE0496A8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2B4D8D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15489 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		CB028A07-D3BE-4790-8D88-9EE2DE0496A8
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15488 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3405941255-1200673726-3802040461-2828403934
	Account Name:		CB028A07-D3BE-4790-8D88-9EE2DE0496A8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2B4C1A
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15487 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3405941255-1200673726-3802040461-2828403934
	Account Name:		CB028A07-D3BE-4790-8D88-9EE2DE0496A8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2B4C1A
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15486 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		CB028A07-D3BE-4790-8D88-9EE2DE0496A8
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15485 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-12030748-1183100974-2536447920-1790394388
	Account Name:		00B7931C-B02E-4684-B01F-2F971440B76A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2B3FD4
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15484 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:09 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-12030748-1183100974-2536447920-1790394388
	Account Name:		00B7931C-B02E-4684-B01F-2F971440B76A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2B3FD4
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15483 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-12030748-1183100974-2536447920-1790394388
	Account Name:		00B7931C-B02E-4684-B01F-2F971440B76A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2B3FD4
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15482 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		00B7931C-B02E-4684-B01F-2F971440B76A
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15481 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-519991461-1219222095-2266155947-1188268808
	Account Name:		1EFE70A5-DA4F-48AB-ABCB-1287088BD346
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2B1362
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15480 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:06 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-519991461-1219222095-2266155947-1188268808
	Account Name:		1EFE70A5-DA4F-48AB-ABCB-1287088BD346
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2B1362
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15479 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:06 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-519991461-1219222095-2266155947-1188268808
	Account Name:		1EFE70A5-DA4F-48AB-ABCB-1287088BD346
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2B1362
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15478 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:06 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1EFE70A5-DA4F-48AB-ABCB-1287088BD346
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15477 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:06 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-12030748-1183100974-2536447920-1790394388
	Account Name:		00B7931C-B02E-4684-B01F-2F971440B76A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2ACB95
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15476 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:01 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-12030748-1183100974-2536447920-1790394388
	Account Name:		00B7931C-B02E-4684-B01F-2F971440B76A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2ACB95
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15475 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-12030748-1183100974-2536447920-1790394388
	Account Name:		00B7931C-B02E-4684-B01F-2F971440B76A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2ACB95
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15474 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		00B7931C-B02E-4684-B01F-2F971440B76A
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15473 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-12030748-1183100974-2536447920-1790394388
	Account Name:		00B7931C-B02E-4684-B01F-2F971440B76A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2AB6FB
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15472 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:01 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-12030748-1183100974-2536447920-1790394388
	Account Name:		00B7931C-B02E-4684-B01F-2F971440B76A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2ABBCD
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15471 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-12030748-1183100974-2536447920-1790394388
	Account Name:		00B7931C-B02E-4684-B01F-2F971440B76A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2ABBCD
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15470 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		00B7931C-B02E-4684-B01F-2F971440B76A
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15469 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-12030748-1183100974-2536447920-1790394388
	Account Name:		00B7931C-B02E-4684-B01F-2F971440B76A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2ABA49
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15468 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:01 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-12030748-1183100974-2536447920-1790394388
	Account Name:		00B7931C-B02E-4684-B01F-2F971440B76A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2ABA49
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15467 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-12030748-1183100974-2536447920-1790394388
	Account Name:		00B7931C-B02E-4684-B01F-2F971440B76A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2ABA49
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15466 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		00B7931C-B02E-4684-B01F-2F971440B76A
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15465 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-12030748-1183100974-2536447920-1790394388
	Account Name:		00B7931C-B02E-4684-B01F-2F971440B76A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2AB8F0
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15464 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:01 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-12030748-1183100974-2536447920-1790394388
	Account Name:		00B7931C-B02E-4684-B01F-2F971440B76A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2AB8F0
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15463 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-12030748-1183100974-2536447920-1790394388
	Account Name:		00B7931C-B02E-4684-B01F-2F971440B76A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2AB8F0
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15462 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		00B7931C-B02E-4684-B01F-2F971440B76A
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15461 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-12030748-1183100974-2536447920-1790394388
	Account Name:		00B7931C-B02E-4684-B01F-2F971440B76A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2AB6FB
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15460 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-12030748-1183100974-2536447920-1790394388
	Account Name:		00B7931C-B02E-4684-B01F-2F971440B76A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2AB6FB
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15459 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		00B7931C-B02E-4684-B01F-2F971440B76A
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15458 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-519991461-1219222095-2266155947-1188268808
	Account Name:		1EFE70A5-DA4F-48AB-ABCB-1287088BD346
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2AA77B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15457 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:00 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-519991461-1219222095-2266155947-1188268808
	Account Name:		1EFE70A5-DA4F-48AB-ABCB-1287088BD346
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2AA77B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15456 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-519991461-1219222095-2266155947-1188268808
	Account Name:		1EFE70A5-DA4F-48AB-ABCB-1287088BD346
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2AA77B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15455 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1EFE70A5-DA4F-48AB-ABCB-1287088BD346
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15454 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-519991461-1219222095-2266155947-1188268808
	Account Name:		1EFE70A5-DA4F-48AB-ABCB-1287088BD346
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2A98F3
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15453 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:00 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-519991461-1219222095-2266155947-1188268808
	Account Name:		1EFE70A5-DA4F-48AB-ABCB-1287088BD346
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2A9A42
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15452 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-519991461-1219222095-2266155947-1188268808
	Account Name:		1EFE70A5-DA4F-48AB-ABCB-1287088BD346
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2A9A42
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15451 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1EFE70A5-DA4F-48AB-ABCB-1287088BD346
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15450 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-519991461-1219222095-2266155947-1188268808
	Account Name:		1EFE70A5-DA4F-48AB-ABCB-1287088BD346
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2A99E1
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15449 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:00 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-519991461-1219222095-2266155947-1188268808
	Account Name:		1EFE70A5-DA4F-48AB-ABCB-1287088BD346
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2A99E1
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15448 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-519991461-1219222095-2266155947-1188268808
	Account Name:		1EFE70A5-DA4F-48AB-ABCB-1287088BD346
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2A99E1
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15447 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1EFE70A5-DA4F-48AB-ABCB-1287088BD346
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15446 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-519991461-1219222095-2266155947-1188268808
	Account Name:		1EFE70A5-DA4F-48AB-ABCB-1287088BD346
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2A9998
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15445 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:00 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-519991461-1219222095-2266155947-1188268808
	Account Name:		1EFE70A5-DA4F-48AB-ABCB-1287088BD346
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2A9998
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15444 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-519991461-1219222095-2266155947-1188268808
	Account Name:		1EFE70A5-DA4F-48AB-ABCB-1287088BD346
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2A9998
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15443 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1EFE70A5-DA4F-48AB-ABCB-1287088BD346
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15442 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-519991461-1219222095-2266155947-1188268808
	Account Name:		1EFE70A5-DA4F-48AB-ABCB-1287088BD346
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2A98F3
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15441 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-519991461-1219222095-2266155947-1188268808
	Account Name:		1EFE70A5-DA4F-48AB-ABCB-1287088BD346
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2A98F3
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15440 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1EFE70A5-DA4F-48AB-ABCB-1287088BD346
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15439 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:12:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3704959777-1239756416-2241101710-1855464446
	Account Name:		DCD53321-2E80-49E5-8E7F-9485FE23986E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x293815
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15438 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:46 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-468359292-1327916801-218143367-1134740067
	Account Name:		1BEA987C-6701-4F26-879A-000D63C2A243
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x293934
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15437 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:45 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2931C0
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15436 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:44 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-468359292-1327916801-218143367-1134740067
	Account Name:		1BEA987C-6701-4F26-879A-000D63C2A243
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x29E695
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15435 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:41 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-468359292-1327916801-218143367-1134740067
	Account Name:		1BEA987C-6701-4F26-879A-000D63C2A243
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x29E695
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15434 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-468359292-1327916801-218143367-1134740067
	Account Name:		1BEA987C-6701-4F26-879A-000D63C2A243
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x29E695
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15433 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1BEA987C-6701-4F26-879A-000D63C2A243
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15432 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3704959777-1239756416-2241101710-1855464446
	Account Name:		DCD53321-2E80-49E5-8E7F-9485FE23986E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x29BD39
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15431 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:39 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3704959777-1239756416-2241101710-1855464446
	Account Name:		DCD53321-2E80-49E5-8E7F-9485FE23986E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x29BD39
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15430 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3704959777-1239756416-2241101710-1855464446
	Account Name:		DCD53321-2E80-49E5-8E7F-9485FE23986E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x29BD39
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15429 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DCD53321-2E80-49E5-8E7F-9485FE23986E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15428 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-468359292-1327916801-218143367-1134740067
	Account Name:		1BEA987C-6701-4F26-879A-000D63C2A243
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2955D2
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15427 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-468359292-1327916801-218143367-1134740067
	Account Name:		1BEA987C-6701-4F26-879A-000D63C2A243
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2955D2
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15426 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-468359292-1327916801-218143367-1134740067
	Account Name:		1BEA987C-6701-4F26-879A-000D63C2A243
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2955D2
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15425 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1BEA987C-6701-4F26-879A-000D63C2A243
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15424 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3704959777-1239756416-2241101710-1855464446
	Account Name:		DCD53321-2E80-49E5-8E7F-9485FE23986E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x295106
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15423 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3704959777-1239756416-2241101710-1855464446
	Account Name:		DCD53321-2E80-49E5-8E7F-9485FE23986E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x295106
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15422 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3704959777-1239756416-2241101710-1855464446
	Account Name:		DCD53321-2E80-49E5-8E7F-9485FE23986E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x295106
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15421 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DCD53321-2E80-49E5-8E7F-9485FE23986E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15420 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-468359292-1327916801-218143367-1134740067
	Account Name:		1BEA987C-6701-4F26-879A-000D63C2A243
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2936CE
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15419 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-468359292-1327916801-218143367-1134740067
	Account Name:		1BEA987C-6701-4F26-879A-000D63C2A243
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x293934
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15418 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-468359292-1327916801-218143367-1134740067
	Account Name:		1BEA987C-6701-4F26-879A-000D63C2A243
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x293934
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15417 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1BEA987C-6701-4F26-879A-000D63C2A243
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15416 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-468359292-1327916801-218143367-1134740067
	Account Name:		1BEA987C-6701-4F26-879A-000D63C2A243
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x293868
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15415 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3704959777-1239756416-2241101710-1855464446
	Account Name:		DCD53321-2E80-49E5-8E7F-9485FE23986E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2935AC
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15414 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-468359292-1327916801-218143367-1134740067
	Account Name:		1BEA987C-6701-4F26-879A-000D63C2A243
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x293868
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15413 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-468359292-1327916801-218143367-1134740067
	Account Name:		1BEA987C-6701-4F26-879A-000D63C2A243
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x293868
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15412 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1BEA987C-6701-4F26-879A-000D63C2A243
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15411 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-468359292-1327916801-218143367-1134740067
	Account Name:		1BEA987C-6701-4F26-879A-000D63C2A243
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2937F7
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15410 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3704959777-1239756416-2241101710-1855464446
	Account Name:		DCD53321-2E80-49E5-8E7F-9485FE23986E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x293815
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15409 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3704959777-1239756416-2241101710-1855464446
	Account Name:		DCD53321-2E80-49E5-8E7F-9485FE23986E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x293815
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15408 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DCD53321-2E80-49E5-8E7F-9485FE23986E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15407 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-468359292-1327916801-218143367-1134740067
	Account Name:		1BEA987C-6701-4F26-879A-000D63C2A243
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2937F7
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15406 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-468359292-1327916801-218143367-1134740067
	Account Name:		1BEA987C-6701-4F26-879A-000D63C2A243
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2937F7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15405 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1BEA987C-6701-4F26-879A-000D63C2A243
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15404 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3704959777-1239756416-2241101710-1855464446
	Account Name:		DCD53321-2E80-49E5-8E7F-9485FE23986E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x293717
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15403 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3704959777-1239756416-2241101710-1855464446
	Account Name:		DCD53321-2E80-49E5-8E7F-9485FE23986E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x293717
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15402 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3704959777-1239756416-2241101710-1855464446
	Account Name:		DCD53321-2E80-49E5-8E7F-9485FE23986E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x293717
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15401 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DCD53321-2E80-49E5-8E7F-9485FE23986E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15400 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-468359292-1327916801-218143367-1134740067
	Account Name:		1BEA987C-6701-4F26-879A-000D63C2A243
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2936CE
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15399 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-468359292-1327916801-218143367-1134740067
	Account Name:		1BEA987C-6701-4F26-879A-000D63C2A243
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2936CE
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15398 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1BEA987C-6701-4F26-879A-000D63C2A243
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15397 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3704959777-1239756416-2241101710-1855464446
	Account Name:		DCD53321-2E80-49E5-8E7F-9485FE23986E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x293651
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15396 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3704959777-1239756416-2241101710-1855464446
	Account Name:		DCD53321-2E80-49E5-8E7F-9485FE23986E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x293651
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15395 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3704959777-1239756416-2241101710-1855464446
	Account Name:		DCD53321-2E80-49E5-8E7F-9485FE23986E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x293651
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15394 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DCD53321-2E80-49E5-8E7F-9485FE23986E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15393 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3704959777-1239756416-2241101710-1855464446
	Account Name:		DCD53321-2E80-49E5-8E7F-9485FE23986E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2935AC
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15392 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3704959777-1239756416-2241101710-1855464446
	Account Name:		DCD53321-2E80-49E5-8E7F-9485FE23986E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2935AC
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15391 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DCD53321-2E80-49E5-8E7F-9485FE23986E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15390 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x27FD20
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15389 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:28 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x2931C0
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{07A26218-EC88-882C-1A5C-3DFA8432F918}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52163
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15388 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:28 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2931C0
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15387 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:28 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1614152390-1156919741-2535341484-261238302
	Account Name:		603602C6-31BD-44F5-AC3D-1E971E2E920F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x281D62
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15386 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:22 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4182909126-1324652237-3610224773-3089707862
	Account Name:		F95220C6-96CD-4EF4-85A8-2FD7563329B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x28B47B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15385 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:19 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4182909126-1324652237-3610224773-3089707862
	Account Name:		F95220C6-96CD-4EF4-85A8-2FD7563329B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x28B47B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15384 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:19 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4182909126-1324652237-3610224773-3089707862
	Account Name:		F95220C6-96CD-4EF4-85A8-2FD7563329B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x28B47B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15383 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:19 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		F95220C6-96CD-4EF4-85A8-2FD7563329B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15382 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:19 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1614152390-1156919741-2535341484-261238302
	Account Name:		603602C6-31BD-44F5-AC3D-1E971E2E920F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x288D21
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15381 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:17 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1614152390-1156919741-2535341484-261238302
	Account Name:		603602C6-31BD-44F5-AC3D-1E971E2E920F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x288D21
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15380 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:17 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1614152390-1156919741-2535341484-261238302
	Account Name:		603602C6-31BD-44F5-AC3D-1E971E2E920F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x288D21
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15379 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:17 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		603602C6-31BD-44F5-AC3D-1E971E2E920F
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15378 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:17 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4182909126-1324652237-3610224773-3089707862
	Account Name:		F95220C6-96CD-4EF4-85A8-2FD7563329B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2848AC
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15377 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:12 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4182909126-1324652237-3610224773-3089707862
	Account Name:		F95220C6-96CD-4EF4-85A8-2FD7563329B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2848AC
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15376 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4182909126-1324652237-3610224773-3089707862
	Account Name:		F95220C6-96CD-4EF4-85A8-2FD7563329B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2848AC
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15375 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		F95220C6-96CD-4EF4-85A8-2FD7563329B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15374 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4182909126-1324652237-3610224773-3089707862
	Account Name:		F95220C6-96CD-4EF4-85A8-2FD7563329B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x283A52
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15373 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:12 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4182909126-1324652237-3610224773-3089707862
	Account Name:		F95220C6-96CD-4EF4-85A8-2FD7563329B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x283B9B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15372 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4182909126-1324652237-3610224773-3089707862
	Account Name:		F95220C6-96CD-4EF4-85A8-2FD7563329B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x283B9B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15371 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		F95220C6-96CD-4EF4-85A8-2FD7563329B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15370 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4182909126-1324652237-3610224773-3089707862
	Account Name:		F95220C6-96CD-4EF4-85A8-2FD7563329B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x283B42
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15369 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:12 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4182909126-1324652237-3610224773-3089707862
	Account Name:		F95220C6-96CD-4EF4-85A8-2FD7563329B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x283B42
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15368 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4182909126-1324652237-3610224773-3089707862
	Account Name:		F95220C6-96CD-4EF4-85A8-2FD7563329B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x283B42
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15367 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		F95220C6-96CD-4EF4-85A8-2FD7563329B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15366 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4182909126-1324652237-3610224773-3089707862
	Account Name:		F95220C6-96CD-4EF4-85A8-2FD7563329B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x283AF9
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15365 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:12 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4182909126-1324652237-3610224773-3089707862
	Account Name:		F95220C6-96CD-4EF4-85A8-2FD7563329B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x283AF9
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15364 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4182909126-1324652237-3610224773-3089707862
	Account Name:		F95220C6-96CD-4EF4-85A8-2FD7563329B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x283AF9
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15363 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		F95220C6-96CD-4EF4-85A8-2FD7563329B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15362 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4182909126-1324652237-3610224773-3089707862
	Account Name:		F95220C6-96CD-4EF4-85A8-2FD7563329B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x283A52
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15361 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4182909126-1324652237-3610224773-3089707862
	Account Name:		F95220C6-96CD-4EF4-85A8-2FD7563329B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x283A52
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15360 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		F95220C6-96CD-4EF4-85A8-2FD7563329B8
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15359 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1614152390-1156919741-2535341484-261238302
	Account Name:		603602C6-31BD-44F5-AC3D-1E971E2E920F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x282ACB
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15358 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:09 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1614152390-1156919741-2535341484-261238302
	Account Name:		603602C6-31BD-44F5-AC3D-1E971E2E920F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x282ACB
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15357 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1614152390-1156919741-2535341484-261238302
	Account Name:		603602C6-31BD-44F5-AC3D-1E971E2E920F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x282ACB
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15356 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		603602C6-31BD-44F5-AC3D-1E971E2E920F
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15355 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1614152390-1156919741-2535341484-261238302
	Account Name:		603602C6-31BD-44F5-AC3D-1E971E2E920F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x281C1A
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15354 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:08 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1614152390-1156919741-2535341484-261238302
	Account Name:		603602C6-31BD-44F5-AC3D-1E971E2E920F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x281D62
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15353 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1614152390-1156919741-2535341484-261238302
	Account Name:		603602C6-31BD-44F5-AC3D-1E971E2E920F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x281D62
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15352 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		603602C6-31BD-44F5-AC3D-1E971E2E920F
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15351 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1614152390-1156919741-2535341484-261238302
	Account Name:		603602C6-31BD-44F5-AC3D-1E971E2E920F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x281D09
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15350 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:08 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1614152390-1156919741-2535341484-261238302
	Account Name:		603602C6-31BD-44F5-AC3D-1E971E2E920F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x281D09
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15349 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1614152390-1156919741-2535341484-261238302
	Account Name:		603602C6-31BD-44F5-AC3D-1E971E2E920F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x281D09
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15348 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		603602C6-31BD-44F5-AC3D-1E971E2E920F
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15347 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1614152390-1156919741-2535341484-261238302
	Account Name:		603602C6-31BD-44F5-AC3D-1E971E2E920F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x281CC0
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15346 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:08 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1614152390-1156919741-2535341484-261238302
	Account Name:		603602C6-31BD-44F5-AC3D-1E971E2E920F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x281CC0
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15345 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1614152390-1156919741-2535341484-261238302
	Account Name:		603602C6-31BD-44F5-AC3D-1E971E2E920F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x281CC0
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15344 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		603602C6-31BD-44F5-AC3D-1E971E2E920F
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15343 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1614152390-1156919741-2535341484-261238302
	Account Name:		603602C6-31BD-44F5-AC3D-1E971E2E920F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x281C1A
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15342 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1614152390-1156919741-2535341484-261238302
	Account Name:		603602C6-31BD-44F5-AC3D-1E971E2E920F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x281C1A
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15341 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		603602C6-31BD-44F5-AC3D-1E971E2E920F
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15340 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4077584091-1111809740-263444385-2592842041
	Account Name:		F30AFEDB-DECC-4244-A1D7-B30F39A18B9A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x255E76
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15339 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:07 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x27FD20
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{A481F2A7-BEB7-42C8-DCDA-FC555767F910}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52156
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15338 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:06 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x27FD20
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15337 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:11:06 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x27204F
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15336 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:59 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2558033070-1276481653-4014807206-2855227386
	Account Name:		98787CAE-9075-4C15-A618-4DEFFA4F2FAA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C6EB5
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15335 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:50 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-328237415-1282274922-3799376811-3589477996
	Account Name:		13908167-F66A-4C6D-ABE3-75E26C16F3D5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C0AFC
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15334 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:50 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x27204F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{07A26218-EC88-882C-1A5C-3DFA8432F918}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52142
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15333 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:43 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x27204F
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15332 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:43 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4207625598-1300470071-3649239431-3164601412
	Account Name:		FACB457E-9937-4D83-87F9-82D944FC9FBC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1E189F
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15331 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:43 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3267003107-1186669414-78428051-1623834090
	Account Name:		C2BA82E3-2366-46BB-93B7-AC04EABDC960
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2265AE
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15330 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:35 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-724234733-1156600059-180888192-250682818
	Account Name:		2B2AF1ED-50FB-44F0-8022-C80AC21DF10E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x26B131
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15329 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:35 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-724234733-1156600059-180888192-250682818
	Account Name:		2B2AF1ED-50FB-44F0-8022-C80AC21DF10E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x26B131
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15328 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-724234733-1156600059-180888192-250682818
	Account Name:		2B2AF1ED-50FB-44F0-8022-C80AC21DF10E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x26B131
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15327 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		2B2AF1ED-50FB-44F0-8022-C80AC21DF10E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15326 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4077584091-1111809740-263444385-2592842041
	Account Name:		F30AFEDB-DECC-4244-A1D7-B30F39A18B9A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x265F93
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15325 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:33 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4077584091-1111809740-263444385-2592842041
	Account Name:		F30AFEDB-DECC-4244-A1D7-B30F39A18B9A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x265F93
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15324 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4077584091-1111809740-263444385-2592842041
	Account Name:		F30AFEDB-DECC-4244-A1D7-B30F39A18B9A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x265F93
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15323 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		F30AFEDB-DECC-4244-A1D7-B30F39A18B9A
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15322 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1193434119-1078886714-2838302632-369826875
	Account Name:		47225C07-813A-404E-A80F-2DA93B1C0B16
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x23841B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15321 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:28 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-724234733-1156600059-180888192-250682818
	Account Name:		2B2AF1ED-50FB-44F0-8022-C80AC21DF10E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x25C4ED
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15320 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:27 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-724234733-1156600059-180888192-250682818
	Account Name:		2B2AF1ED-50FB-44F0-8022-C80AC21DF10E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x25C4ED
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15319 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-724234733-1156600059-180888192-250682818
	Account Name:		2B2AF1ED-50FB-44F0-8022-C80AC21DF10E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x25C4ED
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15318 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		2B2AF1ED-50FB-44F0-8022-C80AC21DF10E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15317 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-614617755-1181119559-655229880-2308654906
	Account Name:		24A2529B-7447-4666-B803-0E273A479B89
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x24B63B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15316 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:26 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-724234733-1156600059-180888192-250682818
	Account Name:		2B2AF1ED-50FB-44F0-8022-C80AC21DF10E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x258EB8
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15315 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:26 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-724234733-1156600059-180888192-250682818
	Account Name:		2B2AF1ED-50FB-44F0-8022-C80AC21DF10E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x25979F
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15314 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-724234733-1156600059-180888192-250682818
	Account Name:		2B2AF1ED-50FB-44F0-8022-C80AC21DF10E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x25979F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15313 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		2B2AF1ED-50FB-44F0-8022-C80AC21DF10E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15312 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-724234733-1156600059-180888192-250682818
	Account Name:		2B2AF1ED-50FB-44F0-8022-C80AC21DF10E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x25947D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15311 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:26 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-724234733-1156600059-180888192-250682818
	Account Name:		2B2AF1ED-50FB-44F0-8022-C80AC21DF10E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x25947D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15310 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-724234733-1156600059-180888192-250682818
	Account Name:		2B2AF1ED-50FB-44F0-8022-C80AC21DF10E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x25947D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15309 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		2B2AF1ED-50FB-44F0-8022-C80AC21DF10E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15308 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-724234733-1156600059-180888192-250682818
	Account Name:		2B2AF1ED-50FB-44F0-8022-C80AC21DF10E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x259211
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15307 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:26 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-724234733-1156600059-180888192-250682818
	Account Name:		2B2AF1ED-50FB-44F0-8022-C80AC21DF10E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x259211
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15306 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-724234733-1156600059-180888192-250682818
	Account Name:		2B2AF1ED-50FB-44F0-8022-C80AC21DF10E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x259211
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15305 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		2B2AF1ED-50FB-44F0-8022-C80AC21DF10E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15304 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4077584091-1111809740-263444385-2592842041
	Account Name:		F30AFEDB-DECC-4244-A1D7-B30F39A18B9A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x25905E
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15303 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:26 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4077584091-1111809740-263444385-2592842041
	Account Name:		F30AFEDB-DECC-4244-A1D7-B30F39A18B9A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x25905E
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15302 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4077584091-1111809740-263444385-2592842041
	Account Name:		F30AFEDB-DECC-4244-A1D7-B30F39A18B9A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x25905E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15301 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		F30AFEDB-DECC-4244-A1D7-B30F39A18B9A
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15300 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-724234733-1156600059-180888192-250682818
	Account Name:		2B2AF1ED-50FB-44F0-8022-C80AC21DF10E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x258EB8
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15299 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-724234733-1156600059-180888192-250682818
	Account Name:		2B2AF1ED-50FB-44F0-8022-C80AC21DF10E
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x258EB8
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15298 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		2B2AF1ED-50FB-44F0-8022-C80AC21DF10E
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15297 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4077584091-1111809740-263444385-2592842041
	Account Name:		F30AFEDB-DECC-4244-A1D7-B30F39A18B9A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x25562F
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15296 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:25 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4077584091-1111809740-263444385-2592842041
	Account Name:		F30AFEDB-DECC-4244-A1D7-B30F39A18B9A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x255E76
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15295 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4077584091-1111809740-263444385-2592842041
	Account Name:		F30AFEDB-DECC-4244-A1D7-B30F39A18B9A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x255E76
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15294 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		F30AFEDB-DECC-4244-A1D7-B30F39A18B9A
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15293 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4077584091-1111809740-263444385-2592842041
	Account Name:		F30AFEDB-DECC-4244-A1D7-B30F39A18B9A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x255BC2
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15292 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:25 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4077584091-1111809740-263444385-2592842041
	Account Name:		F30AFEDB-DECC-4244-A1D7-B30F39A18B9A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x255BC2
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15291 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4077584091-1111809740-263444385-2592842041
	Account Name:		F30AFEDB-DECC-4244-A1D7-B30F39A18B9A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x255BC2
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15290 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		F30AFEDB-DECC-4244-A1D7-B30F39A18B9A
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15289 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4077584091-1111809740-263444385-2592842041
	Account Name:		F30AFEDB-DECC-4244-A1D7-B30F39A18B9A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x25590D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15288 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:25 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4077584091-1111809740-263444385-2592842041
	Account Name:		F30AFEDB-DECC-4244-A1D7-B30F39A18B9A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x25590D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15287 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4077584091-1111809740-263444385-2592842041
	Account Name:		F30AFEDB-DECC-4244-A1D7-B30F39A18B9A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x25590D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15286 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		F30AFEDB-DECC-4244-A1D7-B30F39A18B9A
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15285 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4077584091-1111809740-263444385-2592842041
	Account Name:		F30AFEDB-DECC-4244-A1D7-B30F39A18B9A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x25562F
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15284 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4077584091-1111809740-263444385-2592842041
	Account Name:		F30AFEDB-DECC-4244-A1D7-B30F39A18B9A
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x25562F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15283 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		F30AFEDB-DECC-4244-A1D7-B30F39A18B9A
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15282 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-614617755-1181119559-655229880-2308654906
	Account Name:		24A2529B-7447-4666-B803-0E273A479B89
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x251466
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15281 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:19 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-614617755-1181119559-655229880-2308654906
	Account Name:		24A2529B-7447-4666-B803-0E273A479B89
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x251466
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15280 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:19 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-614617755-1181119559-655229880-2308654906
	Account Name:		24A2529B-7447-4666-B803-0E273A479B89
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x251466
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15279 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:19 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		24A2529B-7447-4666-B803-0E273A479B89
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15278 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:19 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-614617755-1181119559-655229880-2308654906
	Account Name:		24A2529B-7447-4666-B803-0E273A479B89
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x24D2B5
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15277 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:08 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-614617755-1181119559-655229880-2308654906
	Account Name:		24A2529B-7447-4666-B803-0E273A479B89
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x24D2B5
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15276 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-614617755-1181119559-655229880-2308654906
	Account Name:		24A2529B-7447-4666-B803-0E273A479B89
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x24D2B5
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15275 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		24A2529B-7447-4666-B803-0E273A479B89
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15274 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-614617755-1181119559-655229880-2308654906
	Account Name:		24A2529B-7447-4666-B803-0E273A479B89
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x24B4F3
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15273 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:07 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-614617755-1181119559-655229880-2308654906
	Account Name:		24A2529B-7447-4666-B803-0E273A479B89
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x24B63B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15272 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-614617755-1181119559-655229880-2308654906
	Account Name:		24A2529B-7447-4666-B803-0E273A479B89
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x24B63B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15271 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		24A2529B-7447-4666-B803-0E273A479B89
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15270 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-614617755-1181119559-655229880-2308654906
	Account Name:		24A2529B-7447-4666-B803-0E273A479B89
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x24B5E2
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15269 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:07 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-614617755-1181119559-655229880-2308654906
	Account Name:		24A2529B-7447-4666-B803-0E273A479B89
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x24B5E2
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15268 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-614617755-1181119559-655229880-2308654906
	Account Name:		24A2529B-7447-4666-B803-0E273A479B89
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x24B5E2
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15267 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		24A2529B-7447-4666-B803-0E273A479B89
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15266 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-614617755-1181119559-655229880-2308654906
	Account Name:		24A2529B-7447-4666-B803-0E273A479B89
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x24B599
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15265 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:07 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-614617755-1181119559-655229880-2308654906
	Account Name:		24A2529B-7447-4666-B803-0E273A479B89
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x24B599
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15264 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-614617755-1181119559-655229880-2308654906
	Account Name:		24A2529B-7447-4666-B803-0E273A479B89
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x24B599
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15263 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		24A2529B-7447-4666-B803-0E273A479B89
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15262 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-614617755-1181119559-655229880-2308654906
	Account Name:		24A2529B-7447-4666-B803-0E273A479B89
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x24B4F3
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15261 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-614617755-1181119559-655229880-2308654906
	Account Name:		24A2529B-7447-4666-B803-0E273A479B89
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x24B4F3
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15260 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		24A2529B-7447-4666-B803-0E273A479B89
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15259 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:10:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EB6D0
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15258 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:58 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2049388200-1256274133-2677750962-3315280009
	Account Name:		7A272EA8-38D5-4AE1-B23C-9B9F89289BC5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xEEC77
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15257 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:49 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2049388200-1256274133-2677750962-3315280009
	Account Name:		7A272EA8-38D5-4AE1-B23C-9B9F89289BC5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xE80F2
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15256 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:49 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2411394095-1193362761-3538267068-2002547266
	Account Name:		8FBAF42F-4549-4721-BCAB-E5D242725C77
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10A420
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15255 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:42 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2411394095-1193362761-3538267068-2002547266
	Account Name:		8FBAF42F-4549-4721-BCAB-E5D242725C77
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1012DF
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15254 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:42 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-782832809-1252205071-3662491035-1067229781
	Account Name:		2EA914A9-220F-4AA3-9B2D-4DDA55A29C3F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2222F2
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15253 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:41 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3353252838-1192299626-1583393703-689446946
	Account Name:		C7DE93E6-0C6A-4711-A7AB-605E22201829
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x16E97E
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15252 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:37 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3353252838-1192299626-1583393703-689446946
	Account Name:		C7DE93E6-0C6A-4711-A7AB-605E22201829
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x15F7F5
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15251 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:37 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1193434119-1078886714-2838302632-369826875
	Account Name:		47225C07-813A-404E-A80F-2DA93B1C0B16
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x23E1EB
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15250 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:36 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1193434119-1078886714-2838302632-369826875
	Account Name:		47225C07-813A-404E-A80F-2DA93B1C0B16
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x23E1EB
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15249 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1193434119-1078886714-2838302632-369826875
	Account Name:		47225C07-813A-404E-A80F-2DA93B1C0B16
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x23E1EB
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15248 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		47225C07-813A-404E-A80F-2DA93B1C0B16
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15247 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-782832809-1252205071-3662491035-1067229781
	Account Name:		2EA914A9-220F-4AA3-9B2D-4DDA55A29C3F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x23CEF0
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15246 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:35 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-782832809-1252205071-3662491035-1067229781
	Account Name:		2EA914A9-220F-4AA3-9B2D-4DDA55A29C3F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x23CEF0
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15245 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-782832809-1252205071-3662491035-1067229781
	Account Name:		2EA914A9-220F-4AA3-9B2D-4DDA55A29C3F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x23CEF0
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15244 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		2EA914A9-220F-4AA3-9B2D-4DDA55A29C3F
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15243 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EC05F
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15242 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EC04A
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15241 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EC033
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15240 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EBF8D
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15239 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EBF78
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15238 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EBDBC
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15237 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EBF5B
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15236 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EBDA7
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15235 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EBD90
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15234 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EB82F
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15233 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EB81A
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15232 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EC0AB
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15231 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EB803
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15230 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EB745
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15229 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EBFB3
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15228 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EBDE6
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15227 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EB72E
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15226 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EBCD2
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15225 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EB717
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15224 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EB704
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15223 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EBA6D
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15222 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EB989
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15221 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1193434119-1078886714-2838302632-369826875
	Account Name:		47225C07-813A-404E-A80F-2DA93B1C0B16
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2392D4
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15220 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:26 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1193434119-1078886714-2838302632-369826875
	Account Name:		47225C07-813A-404E-A80F-2DA93B1C0B16
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2392D4
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15219 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1193434119-1078886714-2838302632-369826875
	Account Name:		47225C07-813A-404E-A80F-2DA93B1C0B16
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2392D4
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15218 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		47225C07-813A-404E-A80F-2DA93B1C0B16
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15217 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1193434119-1078886714-2838302632-369826875
	Account Name:		47225C07-813A-404E-A80F-2DA93B1C0B16
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2382D4
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15216 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:26 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1193434119-1078886714-2838302632-369826875
	Account Name:		47225C07-813A-404E-A80F-2DA93B1C0B16
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x23841B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15215 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1193434119-1078886714-2838302632-369826875
	Account Name:		47225C07-813A-404E-A80F-2DA93B1C0B16
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x23841B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15214 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		47225C07-813A-404E-A80F-2DA93B1C0B16
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15213 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1193434119-1078886714-2838302632-369826875
	Account Name:		47225C07-813A-404E-A80F-2DA93B1C0B16
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2383C2
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15212 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:26 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1193434119-1078886714-2838302632-369826875
	Account Name:		47225C07-813A-404E-A80F-2DA93B1C0B16
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2383C2
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15211 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1193434119-1078886714-2838302632-369826875
	Account Name:		47225C07-813A-404E-A80F-2DA93B1C0B16
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2383C2
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15210 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		47225C07-813A-404E-A80F-2DA93B1C0B16
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15209 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1193434119-1078886714-2838302632-369826875
	Account Name:		47225C07-813A-404E-A80F-2DA93B1C0B16
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x238379
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15208 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:26 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1193434119-1078886714-2838302632-369826875
	Account Name:		47225C07-813A-404E-A80F-2DA93B1C0B16
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x238379
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15207 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1193434119-1078886714-2838302632-369826875
	Account Name:		47225C07-813A-404E-A80F-2DA93B1C0B16
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x238379
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15206 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		47225C07-813A-404E-A80F-2DA93B1C0B16
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15205 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1193434119-1078886714-2838302632-369826875
	Account Name:		47225C07-813A-404E-A80F-2DA93B1C0B16
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2382D4
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15204 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1193434119-1078886714-2838302632-369826875
	Account Name:		47225C07-813A-404E-A80F-2DA93B1C0B16
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2382D4
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15203 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		47225C07-813A-404E-A80F-2DA93B1C0B16
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15202 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3267003107-1186669414-78428051-1623834090
	Account Name:		C2BA82E3-2366-46BB-93B7-AC04EABDC960
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x233AE1
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15201 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:06 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3267003107-1186669414-78428051-1623834090
	Account Name:		C2BA82E3-2366-46BB-93B7-AC04EABDC960
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x233AE1
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15200 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:06 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3267003107-1186669414-78428051-1623834090
	Account Name:		C2BA82E3-2366-46BB-93B7-AC04EABDC960
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x233AE1
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15199 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:06 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		C2BA82E3-2366-46BB-93B7-AC04EABDC960
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15198 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:09:06 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3198535925-1106413020-3022548099-488590961
	Account Name:		BEA5C8F5-85DC-41F2-836C-28B4714E1F1D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C1CC5
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15197 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:59 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-782832809-1252205071-3662491035-1067229781
	Account Name:		2EA914A9-220F-4AA3-9B2D-4DDA55A29C3F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x229162
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15196 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:55 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-782832809-1252205071-3662491035-1067229781
	Account Name:		2EA914A9-220F-4AA3-9B2D-4DDA55A29C3F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x229162
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15195 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-782832809-1252205071-3662491035-1067229781
	Account Name:		2EA914A9-220F-4AA3-9B2D-4DDA55A29C3F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x229162
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15194 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		2EA914A9-220F-4AA3-9B2D-4DDA55A29C3F
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15193 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3267003107-1186669414-78428051-1623834090
	Account Name:		C2BA82E3-2366-46BB-93B7-AC04EABDC960
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2274C3
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15192 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:54 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3267003107-1186669414-78428051-1623834090
	Account Name:		C2BA82E3-2366-46BB-93B7-AC04EABDC960
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2274C3
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15191 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3267003107-1186669414-78428051-1623834090
	Account Name:		C2BA82E3-2366-46BB-93B7-AC04EABDC960
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2274C3
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15190 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		C2BA82E3-2366-46BB-93B7-AC04EABDC960
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15189 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3267003107-1186669414-78428051-1623834090
	Account Name:		C2BA82E3-2366-46BB-93B7-AC04EABDC960
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x22644D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15188 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:54 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3267003107-1186669414-78428051-1623834090
	Account Name:		C2BA82E3-2366-46BB-93B7-AC04EABDC960
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2265AE
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15187 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3267003107-1186669414-78428051-1623834090
	Account Name:		C2BA82E3-2366-46BB-93B7-AC04EABDC960
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2265AE
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15186 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		C2BA82E3-2366-46BB-93B7-AC04EABDC960
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15185 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3267003107-1186669414-78428051-1623834090
	Account Name:		C2BA82E3-2366-46BB-93B7-AC04EABDC960
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x22654D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15184 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:54 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3267003107-1186669414-78428051-1623834090
	Account Name:		C2BA82E3-2366-46BB-93B7-AC04EABDC960
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x22654D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15183 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3267003107-1186669414-78428051-1623834090
	Account Name:		C2BA82E3-2366-46BB-93B7-AC04EABDC960
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x22654D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15182 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		C2BA82E3-2366-46BB-93B7-AC04EABDC960
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15181 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3267003107-1186669414-78428051-1623834090
	Account Name:		C2BA82E3-2366-46BB-93B7-AC04EABDC960
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2264FE
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15180 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:54 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3267003107-1186669414-78428051-1623834090
	Account Name:		C2BA82E3-2366-46BB-93B7-AC04EABDC960
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2264FE
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15179 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3267003107-1186669414-78428051-1623834090
	Account Name:		C2BA82E3-2366-46BB-93B7-AC04EABDC960
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2264FE
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15178 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		C2BA82E3-2366-46BB-93B7-AC04EABDC960
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15177 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3267003107-1186669414-78428051-1623834090
	Account Name:		C2BA82E3-2366-46BB-93B7-AC04EABDC960
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x22644D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15176 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3267003107-1186669414-78428051-1623834090
	Account Name:		C2BA82E3-2366-46BB-93B7-AC04EABDC960
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x22644D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15175 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		C2BA82E3-2366-46BB-93B7-AC04EABDC960
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15174 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-782832809-1252205071-3662491035-1067229781
	Account Name:		2EA914A9-220F-4AA3-9B2D-4DDA55A29C3F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x223277
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15173 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:46 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-782832809-1252205071-3662491035-1067229781
	Account Name:		2EA914A9-220F-4AA3-9B2D-4DDA55A29C3F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x223277
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15172 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-782832809-1252205071-3662491035-1067229781
	Account Name:		2EA914A9-220F-4AA3-9B2D-4DDA55A29C3F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x223277
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15171 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		2EA914A9-220F-4AA3-9B2D-4DDA55A29C3F
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15170 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-782832809-1252205071-3662491035-1067229781
	Account Name:		2EA914A9-220F-4AA3-9B2D-4DDA55A29C3F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2221A4
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15169 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:45 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-782832809-1252205071-3662491035-1067229781
	Account Name:		2EA914A9-220F-4AA3-9B2D-4DDA55A29C3F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2222F2
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15168 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-782832809-1252205071-3662491035-1067229781
	Account Name:		2EA914A9-220F-4AA3-9B2D-4DDA55A29C3F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2222F2
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15167 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		2EA914A9-220F-4AA3-9B2D-4DDA55A29C3F
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15166 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-782832809-1252205071-3662491035-1067229781
	Account Name:		2EA914A9-220F-4AA3-9B2D-4DDA55A29C3F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x222299
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15165 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:45 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-782832809-1252205071-3662491035-1067229781
	Account Name:		2EA914A9-220F-4AA3-9B2D-4DDA55A29C3F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x222299
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15164 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-782832809-1252205071-3662491035-1067229781
	Account Name:		2EA914A9-220F-4AA3-9B2D-4DDA55A29C3F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x222299
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15163 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		2EA914A9-220F-4AA3-9B2D-4DDA55A29C3F
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15162 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-782832809-1252205071-3662491035-1067229781
	Account Name:		2EA914A9-220F-4AA3-9B2D-4DDA55A29C3F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x222250
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15161 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:45 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-782832809-1252205071-3662491035-1067229781
	Account Name:		2EA914A9-220F-4AA3-9B2D-4DDA55A29C3F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x222250
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15160 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-782832809-1252205071-3662491035-1067229781
	Account Name:		2EA914A9-220F-4AA3-9B2D-4DDA55A29C3F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x222250
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15159 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		2EA914A9-220F-4AA3-9B2D-4DDA55A29C3F
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15158 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-782832809-1252205071-3662491035-1067229781
	Account Name:		2EA914A9-220F-4AA3-9B2D-4DDA55A29C3F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2221A4
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15157 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-782832809-1252205071-3662491035-1067229781
	Account Name:		2EA914A9-220F-4AA3-9B2D-4DDA55A29C3F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x2221A4
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15156 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		2EA914A9-220F-4AA3-9B2D-4DDA55A29C3F
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15155 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1EC0AB
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52061
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15154 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EC0AB
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15153 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1EC05F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52060
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15152 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EC05F
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15151 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1EC04A
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52060
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15150 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EC04A
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15149 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1EC033
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52060
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15148 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EC033
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15147 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1EBFB3
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52061
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15146 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EBFB3
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15145 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1EBF8D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52060
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15144 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EBF8D
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15143 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1EBF78
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52060
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15142 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EBF78
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15141 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1EBF5B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52060
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15140 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EBF5B
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15139 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1EBDE6
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52061
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15138 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EBDE6
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15137 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1EBDBC
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52060
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15136 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EBDBC
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15135 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1EBDA7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52060
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15134 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EBDA7
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15133 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1EBD90
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52060
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15132 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EBD90
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15131 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1EBCD2
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52061
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15130 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EBCD2
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15129 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1EBA6D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52061
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15128 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EBA6D
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15127 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1EB989
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52061
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15126 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EB989
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15125 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1EB82F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52060
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15124 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EB82F
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15123 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1EB81A
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52060
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15122 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EB81A
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15121 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1EB803
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52060
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15120 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EB803
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15119 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1EB745
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52060
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15118 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EB745
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15117 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1EB72E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52060
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15116 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EB72E
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15115 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1EB717
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52060
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15114 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EB717
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15113 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1EB704
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52060
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15112 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EB704
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15111 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1EB6D0
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52059
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15110 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1EB6D0
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15109 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4207625598-1300470071-3649239431-3164601412
	Account Name:		FACB457E-9937-4D83-87F9-82D944FC9FBC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1E9F3A
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15108 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:32 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4207625598-1300470071-3649239431-3164601412
	Account Name:		FACB457E-9937-4D83-87F9-82D944FC9FBC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1E9F3A
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15107 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4207625598-1300470071-3649239431-3164601412
	Account Name:		FACB457E-9937-4D83-87F9-82D944FC9FBC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1E9F3A
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15106 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		FACB457E-9937-4D83-87F9-82D944FC9FBC
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15105 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:32 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3728979716-1299781239-2727012029-610826166
	Account Name:		DE43B704-1677-4D79-BDE6-8AA2B6776824
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x19B2FF
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15104 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:31 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4207625598-1300470071-3649239431-3164601412
	Account Name:		FACB457E-9937-4D83-87F9-82D944FC9FBC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1E2A25
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15103 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:23 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4207625598-1300470071-3649239431-3164601412
	Account Name:		FACB457E-9937-4D83-87F9-82D944FC9FBC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1E2A25
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15102 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4207625598-1300470071-3649239431-3164601412
	Account Name:		FACB457E-9937-4D83-87F9-82D944FC9FBC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1E2A25
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15101 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		FACB457E-9937-4D83-87F9-82D944FC9FBC
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15100 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4207625598-1300470071-3649239431-3164601412
	Account Name:		FACB457E-9937-4D83-87F9-82D944FC9FBC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1E1367
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15099 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:23 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4207625598-1300470071-3649239431-3164601412
	Account Name:		FACB457E-9937-4D83-87F9-82D944FC9FBC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1E189F
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15098 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4207625598-1300470071-3649239431-3164601412
	Account Name:		FACB457E-9937-4D83-87F9-82D944FC9FBC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1E189F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15097 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		FACB457E-9937-4D83-87F9-82D944FC9FBC
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15096 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4207625598-1300470071-3649239431-3164601412
	Account Name:		FACB457E-9937-4D83-87F9-82D944FC9FBC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1E1719
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15095 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:23 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4207625598-1300470071-3649239431-3164601412
	Account Name:		FACB457E-9937-4D83-87F9-82D944FC9FBC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1E1719
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15094 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4207625598-1300470071-3649239431-3164601412
	Account Name:		FACB457E-9937-4D83-87F9-82D944FC9FBC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1E1719
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15093 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		FACB457E-9937-4D83-87F9-82D944FC9FBC
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15092 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-4207625598-1300470071-3649239431-3164601412
	Account Name:		FACB457E-9937-4D83-87F9-82D944FC9FBC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1E15A6
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15091 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:22 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4207625598-1300470071-3649239431-3164601412
	Account Name:		FACB457E-9937-4D83-87F9-82D944FC9FBC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1E15A6
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15090 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4207625598-1300470071-3649239431-3164601412
	Account Name:		FACB457E-9937-4D83-87F9-82D944FC9FBC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1E15A6
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15089 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		FACB457E-9937-4D83-87F9-82D944FC9FBC
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15088 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-4207625598-1300470071-3649239431-3164601412
	Account Name:		FACB457E-9937-4D83-87F9-82D944FC9FBC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1E1367
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15087 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-4207625598-1300470071-3649239431-3164601412
	Account Name:		FACB457E-9937-4D83-87F9-82D944FC9FBC
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1E1367
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15086 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		FACB457E-9937-4D83-87F9-82D944FC9FBC
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15085 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:22 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1D9EE4
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15084 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:21 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2796128336-1074999379-3515304582-962809565
	Account Name:		A6A98850-3053-4013-864A-87D1DD4E6339
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C8EDA
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15083 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:06 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1D9EE4
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{07A26218-EC88-882C-1A5C-3DFA8432F918}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		52040
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15082 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1D9EE4
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15081 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:08:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2796128336-1074999379-3515304582-962809565
	Account Name:		A6A98850-3053-4013-864A-87D1DD4E6339
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1D7EC9
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15080 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:53 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2796128336-1074999379-3515304582-962809565
	Account Name:		A6A98850-3053-4013-864A-87D1DD4E6339
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1D7EC9
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15079 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2796128336-1074999379-3515304582-962809565
	Account Name:		A6A98850-3053-4013-864A-87D1DD4E6339
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1D7EC9
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15078 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		A6A98850-3053-4013-864A-87D1DD4E6339
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15077 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2558033070-1276481653-4014807206-2855227386
	Account Name:		98787CAE-9075-4C15-A618-4DEFFA4F2FAA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1D53FA
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15076 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:49 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2558033070-1276481653-4014807206-2855227386
	Account Name:		98787CAE-9075-4C15-A618-4DEFFA4F2FAA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1D53FA
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15075 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2558033070-1276481653-4014807206-2855227386
	Account Name:		98787CAE-9075-4C15-A618-4DEFFA4F2FAA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1D53FA
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15074 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		98787CAE-9075-4C15-A618-4DEFFA4F2FAA
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15073 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3198535925-1106413020-3022548099-488590961
	Account Name:		BEA5C8F5-85DC-41F2-836C-28B4714E1F1D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1D2A76
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15072 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:45 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3198535925-1106413020-3022548099-488590961
	Account Name:		BEA5C8F5-85DC-41F2-836C-28B4714E1F1D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1D2A76
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15071 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3198535925-1106413020-3022548099-488590961
	Account Name:		BEA5C8F5-85DC-41F2-836C-28B4714E1F1D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1D2A76
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15070 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		BEA5C8F5-85DC-41F2-836C-28B4714E1F1D
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15069 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-328237415-1282274922-3799376811-3589477996
	Account Name:		13908167-F66A-4C6D-ABE3-75E26C16F3D5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1CBD6C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15068 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:37 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-328237415-1282274922-3799376811-3589477996
	Account Name:		13908167-F66A-4C6D-ABE3-75E26C16F3D5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1CBD6C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15067 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-328237415-1282274922-3799376811-3589477996
	Account Name:		13908167-F66A-4C6D-ABE3-75E26C16F3D5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1CBD6C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15066 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		13908167-F66A-4C6D-ABE3-75E26C16F3D5
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15065 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2796128336-1074999379-3515304582-962809565
	Account Name:		A6A98850-3053-4013-864A-87D1DD4E6339
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C9FC2
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15064 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:36 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2796128336-1074999379-3515304582-962809565
	Account Name:		A6A98850-3053-4013-864A-87D1DD4E6339
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C9FC2
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15063 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2796128336-1074999379-3515304582-962809565
	Account Name:		A6A98850-3053-4013-864A-87D1DD4E6339
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C9FC2
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15062 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		A6A98850-3053-4013-864A-87D1DD4E6339
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15061 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:36 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3728979716-1299781239-2727012029-610826166
	Account Name:		DE43B704-1677-4D79-BDE6-8AA2B6776824
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C9BEE
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15060 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:35 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3728979716-1299781239-2727012029-610826166
	Account Name:		DE43B704-1677-4D79-BDE6-8AA2B6776824
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C9BEE
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15059 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3728979716-1299781239-2727012029-610826166
	Account Name:		DE43B704-1677-4D79-BDE6-8AA2B6776824
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C9BEE
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15058 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DE43B704-1677-4D79-BDE6-8AA2B6776824
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15057 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2796128336-1074999379-3515304582-962809565
	Account Name:		A6A98850-3053-4013-864A-87D1DD4E6339
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C88BB
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15056 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:35 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2796128336-1074999379-3515304582-962809565
	Account Name:		A6A98850-3053-4013-864A-87D1DD4E6339
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C8EDA
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15055 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2796128336-1074999379-3515304582-962809565
	Account Name:		A6A98850-3053-4013-864A-87D1DD4E6339
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C8EDA
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15054 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		A6A98850-3053-4013-864A-87D1DD4E6339
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15053 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2796128336-1074999379-3515304582-962809565
	Account Name:		A6A98850-3053-4013-864A-87D1DD4E6339
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C8C88
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15052 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:35 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2796128336-1074999379-3515304582-962809565
	Account Name:		A6A98850-3053-4013-864A-87D1DD4E6339
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C8C88
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15051 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2796128336-1074999379-3515304582-962809565
	Account Name:		A6A98850-3053-4013-864A-87D1DD4E6339
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C8C88
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15050 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		A6A98850-3053-4013-864A-87D1DD4E6339
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15049 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2796128336-1074999379-3515304582-962809565
	Account Name:		A6A98850-3053-4013-864A-87D1DD4E6339
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C8B27
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15048 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:35 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2796128336-1074999379-3515304582-962809565
	Account Name:		A6A98850-3053-4013-864A-87D1DD4E6339
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C8B27
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15047 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2796128336-1074999379-3515304582-962809565
	Account Name:		A6A98850-3053-4013-864A-87D1DD4E6339
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C8B27
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15046 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		A6A98850-3053-4013-864A-87D1DD4E6339
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15045 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2796128336-1074999379-3515304582-962809565
	Account Name:		A6A98850-3053-4013-864A-87D1DD4E6339
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C88BB
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15044 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2796128336-1074999379-3515304582-962809565
	Account Name:		A6A98850-3053-4013-864A-87D1DD4E6339
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C88BB
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15043 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		A6A98850-3053-4013-864A-87D1DD4E6339
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15042 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:35 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2558033070-1276481653-4014807206-2855227386
	Account Name:		98787CAE-9075-4C15-A618-4DEFFA4F2FAA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C7D0D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15041 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2558033070-1276481653-4014807206-2855227386
	Account Name:		98787CAE-9075-4C15-A618-4DEFFA4F2FAA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C7D0D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15040 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2558033070-1276481653-4014807206-2855227386
	Account Name:		98787CAE-9075-4C15-A618-4DEFFA4F2FAA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C7D0D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15039 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		98787CAE-9075-4C15-A618-4DEFFA4F2FAA
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15038 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2558033070-1276481653-4014807206-2855227386
	Account Name:		98787CAE-9075-4C15-A618-4DEFFA4F2FAA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C6D66
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15037 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2558033070-1276481653-4014807206-2855227386
	Account Name:		98787CAE-9075-4C15-A618-4DEFFA4F2FAA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C6EB5
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15036 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2558033070-1276481653-4014807206-2855227386
	Account Name:		98787CAE-9075-4C15-A618-4DEFFA4F2FAA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C6EB5
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15035 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		98787CAE-9075-4C15-A618-4DEFFA4F2FAA
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15034 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2558033070-1276481653-4014807206-2855227386
	Account Name:		98787CAE-9075-4C15-A618-4DEFFA4F2FAA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C6E5C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15033 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2558033070-1276481653-4014807206-2855227386
	Account Name:		98787CAE-9075-4C15-A618-4DEFFA4F2FAA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C6E5C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15032 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2558033070-1276481653-4014807206-2855227386
	Account Name:		98787CAE-9075-4C15-A618-4DEFFA4F2FAA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C6E5C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15031 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		98787CAE-9075-4C15-A618-4DEFFA4F2FAA
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15030 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2558033070-1276481653-4014807206-2855227386
	Account Name:		98787CAE-9075-4C15-A618-4DEFFA4F2FAA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C6E13
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15029 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2558033070-1276481653-4014807206-2855227386
	Account Name:		98787CAE-9075-4C15-A618-4DEFFA4F2FAA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C6E13
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15028 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2558033070-1276481653-4014807206-2855227386
	Account Name:		98787CAE-9075-4C15-A618-4DEFFA4F2FAA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C6E13
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15027 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		98787CAE-9075-4C15-A618-4DEFFA4F2FAA
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15026 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2558033070-1276481653-4014807206-2855227386
	Account Name:		98787CAE-9075-4C15-A618-4DEFFA4F2FAA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C6D66
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15025 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2558033070-1276481653-4014807206-2855227386
	Account Name:		98787CAE-9075-4C15-A618-4DEFFA4F2FAA
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C6D66
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15024 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		98787CAE-9075-4C15-A618-4DEFFA4F2FAA
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15023 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3198535925-1106413020-3022548099-488590961
	Account Name:		BEA5C8F5-85DC-41F2-836C-28B4714E1F1D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C604C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15022 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:33 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3198535925-1106413020-3022548099-488590961
	Account Name:		BEA5C8F5-85DC-41F2-836C-28B4714E1F1D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C604C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15021 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3198535925-1106413020-3022548099-488590961
	Account Name:		BEA5C8F5-85DC-41F2-836C-28B4714E1F1D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C604C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15020 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		BEA5C8F5-85DC-41F2-836C-28B4714E1F1D
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15019 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:33 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3198535925-1106413020-3022548099-488590961
	Account Name:		BEA5C8F5-85DC-41F2-836C-28B4714E1F1D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C181E
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15018 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:27 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3198535925-1106413020-3022548099-488590961
	Account Name:		BEA5C8F5-85DC-41F2-836C-28B4714E1F1D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C1CC5
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15017 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3198535925-1106413020-3022548099-488590961
	Account Name:		BEA5C8F5-85DC-41F2-836C-28B4714E1F1D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C1CC5
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15016 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		BEA5C8F5-85DC-41F2-836C-28B4714E1F1D
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15015 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-328237415-1282274922-3799376811-3589477996
	Account Name:		13908167-F66A-4C6D-ABE3-75E26C16F3D5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C1C6C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15014 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:27 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-328237415-1282274922-3799376811-3589477996
	Account Name:		13908167-F66A-4C6D-ABE3-75E26C16F3D5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C1C6C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15013 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-328237415-1282274922-3799376811-3589477996
	Account Name:		13908167-F66A-4C6D-ABE3-75E26C16F3D5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C1C6C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15012 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		13908167-F66A-4C6D-ABE3-75E26C16F3D5
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15011 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3198535925-1106413020-3022548099-488590961
	Account Name:		BEA5C8F5-85DC-41F2-836C-28B4714E1F1D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C1B1C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15010 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:27 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3198535925-1106413020-3022548099-488590961
	Account Name:		BEA5C8F5-85DC-41F2-836C-28B4714E1F1D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C1B1C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15009 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3198535925-1106413020-3022548099-488590961
	Account Name:		BEA5C8F5-85DC-41F2-836C-28B4714E1F1D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C1B1C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15008 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		BEA5C8F5-85DC-41F2-836C-28B4714E1F1D
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15007 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3198535925-1106413020-3022548099-488590961
	Account Name:		BEA5C8F5-85DC-41F2-836C-28B4714E1F1D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C1A6B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 15006 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:27 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3198535925-1106413020-3022548099-488590961
	Account Name:		BEA5C8F5-85DC-41F2-836C-28B4714E1F1D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C1A6B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15005 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3198535925-1106413020-3022548099-488590961
	Account Name:		BEA5C8F5-85DC-41F2-836C-28B4714E1F1D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C1A6B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15004 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		BEA5C8F5-85DC-41F2-836C-28B4714E1F1D
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15003 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3198535925-1106413020-3022548099-488590961
	Account Name:		BEA5C8F5-85DC-41F2-836C-28B4714E1F1D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C181E
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 15002 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3198535925-1106413020-3022548099-488590961
	Account Name:		BEA5C8F5-85DC-41F2-836C-28B4714E1F1D
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C181E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 15001 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		BEA5C8F5-85DC-41F2-836C-28B4714E1F1D
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 15000 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-328237415-1282274922-3799376811-3589477996
	Account Name:		13908167-F66A-4C6D-ABE3-75E26C16F3D5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C09B0
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14999 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:26 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-328237415-1282274922-3799376811-3589477996
	Account Name:		13908167-F66A-4C6D-ABE3-75E26C16F3D5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C0AFC
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14998 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-328237415-1282274922-3799376811-3589477996
	Account Name:		13908167-F66A-4C6D-ABE3-75E26C16F3D5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C0AFC
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14997 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		13908167-F66A-4C6D-ABE3-75E26C16F3D5
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14996 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-328237415-1282274922-3799376811-3589477996
	Account Name:		13908167-F66A-4C6D-ABE3-75E26C16F3D5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C0AA3
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14995 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:26 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-328237415-1282274922-3799376811-3589477996
	Account Name:		13908167-F66A-4C6D-ABE3-75E26C16F3D5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C0AA3
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14994 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-328237415-1282274922-3799376811-3589477996
	Account Name:		13908167-F66A-4C6D-ABE3-75E26C16F3D5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C0AA3
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14993 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		13908167-F66A-4C6D-ABE3-75E26C16F3D5
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14992 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-328237415-1282274922-3799376811-3589477996
	Account Name:		13908167-F66A-4C6D-ABE3-75E26C16F3D5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C0A56
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14991 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:26 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-328237415-1282274922-3799376811-3589477996
	Account Name:		13908167-F66A-4C6D-ABE3-75E26C16F3D5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C0A56
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14990 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-328237415-1282274922-3799376811-3589477996
	Account Name:		13908167-F66A-4C6D-ABE3-75E26C16F3D5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C0A56
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14989 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		13908167-F66A-4C6D-ABE3-75E26C16F3D5
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14988 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-328237415-1282274922-3799376811-3589477996
	Account Name:		13908167-F66A-4C6D-ABE3-75E26C16F3D5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C09B0
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14987 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-328237415-1282274922-3799376811-3589477996
	Account Name:		13908167-F66A-4C6D-ABE3-75E26C16F3D5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1C09B0
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14986 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		13908167-F66A-4C6D-ABE3-75E26C16F3D5
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14985 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1676961475-1308138492-3161549703-1612137847
	Account Name:		63F466C3-9BFC-4DF8-876B-71BC77451760
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1ACA45
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14984 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:12 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1712658217-1322089911-2704141978-3263764595
	Account Name:		66151729-7DB7-4ECD-9AEE-2DA1731889C2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x198B65
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14983 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:06 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1676961475-1308138492-3161549703-1612137847
	Account Name:		63F466C3-9BFC-4DF8-876B-71BC77451760
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1B2B04
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14982 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1676961475-1308138492-3161549703-1612137847
	Account Name:		63F466C3-9BFC-4DF8-876B-71BC77451760
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1B2B04
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14981 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1676961475-1308138492-3161549703-1612137847
	Account Name:		63F466C3-9BFC-4DF8-876B-71BC77451760
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1B2B04
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14980 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		63F466C3-9BFC-4DF8-876B-71BC77451760
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14979 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1712658217-1322089911-2704141978-3263764595
	Account Name:		66151729-7DB7-4ECD-9AEE-2DA1731889C2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1B0226
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14978 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:01 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1712658217-1322089911-2704141978-3263764595
	Account Name:		66151729-7DB7-4ECD-9AEE-2DA1731889C2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1B0226
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14977 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1712658217-1322089911-2704141978-3263764595
	Account Name:		66151729-7DB7-4ECD-9AEE-2DA1731889C2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1B0226
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14976 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		66151729-7DB7-4ECD-9AEE-2DA1731889C2
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14975 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:07:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x165431
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14974 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:58 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1676961475-1308138492-3161549703-1612137847
	Account Name:		63F466C3-9BFC-4DF8-876B-71BC77451760
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1AD84B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14973 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:54 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1676961475-1308138492-3161549703-1612137847
	Account Name:		63F466C3-9BFC-4DF8-876B-71BC77451760
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1AD84B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14972 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1676961475-1308138492-3161549703-1612137847
	Account Name:		63F466C3-9BFC-4DF8-876B-71BC77451760
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1AD84B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14971 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		63F466C3-9BFC-4DF8-876B-71BC77451760
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14970 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1676961475-1308138492-3161549703-1612137847
	Account Name:		63F466C3-9BFC-4DF8-876B-71BC77451760
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1AC8FE
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14969 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:53 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1676961475-1308138492-3161549703-1612137847
	Account Name:		63F466C3-9BFC-4DF8-876B-71BC77451760
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1ACA45
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14968 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1676961475-1308138492-3161549703-1612137847
	Account Name:		63F466C3-9BFC-4DF8-876B-71BC77451760
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1ACA45
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14967 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		63F466C3-9BFC-4DF8-876B-71BC77451760
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14966 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1676961475-1308138492-3161549703-1612137847
	Account Name:		63F466C3-9BFC-4DF8-876B-71BC77451760
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1AC9EC
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14965 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:53 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1676961475-1308138492-3161549703-1612137847
	Account Name:		63F466C3-9BFC-4DF8-876B-71BC77451760
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1AC9EC
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14964 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1676961475-1308138492-3161549703-1612137847
	Account Name:		63F466C3-9BFC-4DF8-876B-71BC77451760
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1AC9EC
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14963 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		63F466C3-9BFC-4DF8-876B-71BC77451760
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14962 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1676961475-1308138492-3161549703-1612137847
	Account Name:		63F466C3-9BFC-4DF8-876B-71BC77451760
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1AC9A3
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14961 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:53 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1676961475-1308138492-3161549703-1612137847
	Account Name:		63F466C3-9BFC-4DF8-876B-71BC77451760
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1AC9A3
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14960 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1676961475-1308138492-3161549703-1612137847
	Account Name:		63F466C3-9BFC-4DF8-876B-71BC77451760
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1AC9A3
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14959 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		63F466C3-9BFC-4DF8-876B-71BC77451760
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14958 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1676961475-1308138492-3161549703-1612137847
	Account Name:		63F466C3-9BFC-4DF8-876B-71BC77451760
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1AC8FE
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14957 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1676961475-1308138492-3161549703-1612137847
	Account Name:		63F466C3-9BFC-4DF8-876B-71BC77451760
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1AC8FE
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14956 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		63F466C3-9BFC-4DF8-876B-71BC77451760
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14955 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x165528
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14954 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x165513
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14953 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1654B8
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14952 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x165465
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14951 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x165586
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14950 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3728979716-1299781239-2727012029-610826166
	Account Name:		DE43B704-1677-4D79-BDE6-8AA2B6776824
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1A8AF4
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14949 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3728979716-1299781239-2727012029-610826166
	Account Name:		DE43B704-1677-4D79-BDE6-8AA2B6776824
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1A8AF4
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14948 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3728979716-1299781239-2727012029-610826166
	Account Name:		DE43B704-1677-4D79-BDE6-8AA2B6776824
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1A8AF4
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14947 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DE43B704-1677-4D79-BDE6-8AA2B6776824
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14946 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:34 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1712658217-1322089911-2704141978-3263764595
	Account Name:		66151729-7DB7-4ECD-9AEE-2DA1731889C2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1A5E1D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14945 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:31 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1712658217-1322089911-2704141978-3263764595
	Account Name:		66151729-7DB7-4ECD-9AEE-2DA1731889C2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1A5E1D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14944 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:31 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1712658217-1322089911-2704141978-3263764595
	Account Name:		66151729-7DB7-4ECD-9AEE-2DA1731889C2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1A5E1D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14943 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:31 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		66151729-7DB7-4ECD-9AEE-2DA1731889C2
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14942 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:31 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3728979716-1299781239-2727012029-610826166
	Account Name:		DE43B704-1677-4D79-BDE6-8AA2B6776824
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x19CE0C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14941 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:27 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3728979716-1299781239-2727012029-610826166
	Account Name:		DE43B704-1677-4D79-BDE6-8AA2B6776824
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x19CE0C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14940 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3728979716-1299781239-2727012029-610826166
	Account Name:		DE43B704-1677-4D79-BDE6-8AA2B6776824
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x19CE0C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14939 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DE43B704-1677-4D79-BDE6-8AA2B6776824
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14938 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3728979716-1299781239-2727012029-610826166
	Account Name:		DE43B704-1677-4D79-BDE6-8AA2B6776824
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x19B0C4
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14937 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:26 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3728979716-1299781239-2727012029-610826166
	Account Name:		DE43B704-1677-4D79-BDE6-8AA2B6776824
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x19B2FF
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14936 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3728979716-1299781239-2727012029-610826166
	Account Name:		DE43B704-1677-4D79-BDE6-8AA2B6776824
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x19B2FF
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14935 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DE43B704-1677-4D79-BDE6-8AA2B6776824
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14934 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3728979716-1299781239-2727012029-610826166
	Account Name:		DE43B704-1677-4D79-BDE6-8AA2B6776824
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x19B292
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14933 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:26 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3728979716-1299781239-2727012029-610826166
	Account Name:		DE43B704-1677-4D79-BDE6-8AA2B6776824
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x19B292
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14932 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3728979716-1299781239-2727012029-610826166
	Account Name:		DE43B704-1677-4D79-BDE6-8AA2B6776824
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x19B292
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14931 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DE43B704-1677-4D79-BDE6-8AA2B6776824
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14930 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3728979716-1299781239-2727012029-610826166
	Account Name:		DE43B704-1677-4D79-BDE6-8AA2B6776824
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x19B239
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14929 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:26 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3728979716-1299781239-2727012029-610826166
	Account Name:		DE43B704-1677-4D79-BDE6-8AA2B6776824
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x19B239
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14928 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3728979716-1299781239-2727012029-610826166
	Account Name:		DE43B704-1677-4D79-BDE6-8AA2B6776824
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x19B239
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14927 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DE43B704-1677-4D79-BDE6-8AA2B6776824
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14926 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3728979716-1299781239-2727012029-610826166
	Account Name:		DE43B704-1677-4D79-BDE6-8AA2B6776824
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x19B0C4
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14925 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3728979716-1299781239-2727012029-610826166
	Account Name:		DE43B704-1677-4D79-BDE6-8AA2B6776824
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x19B0C4
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14924 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DE43B704-1677-4D79-BDE6-8AA2B6776824
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14923 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1712658217-1322089911-2704141978-3263764595
	Account Name:		66151729-7DB7-4ECD-9AEE-2DA1731889C2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x199CE9
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14922 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:26 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1712658217-1322089911-2704141978-3263764595
	Account Name:		66151729-7DB7-4ECD-9AEE-2DA1731889C2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x199CE9
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14921 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1712658217-1322089911-2704141978-3263764595
	Account Name:		66151729-7DB7-4ECD-9AEE-2DA1731889C2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x199CE9
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14920 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		66151729-7DB7-4ECD-9AEE-2DA1731889C2
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14919 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:26 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1712658217-1322089911-2704141978-3263764595
	Account Name:		66151729-7DB7-4ECD-9AEE-2DA1731889C2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x19889E
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14918 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:25 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1712658217-1322089911-2704141978-3263764595
	Account Name:		66151729-7DB7-4ECD-9AEE-2DA1731889C2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x198B65
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14917 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1712658217-1322089911-2704141978-3263764595
	Account Name:		66151729-7DB7-4ECD-9AEE-2DA1731889C2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x198B65
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14916 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		66151729-7DB7-4ECD-9AEE-2DA1731889C2
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14915 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1712658217-1322089911-2704141978-3263764595
	Account Name:		66151729-7DB7-4ECD-9AEE-2DA1731889C2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x198A57
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14914 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:25 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1712658217-1322089911-2704141978-3263764595
	Account Name:		66151729-7DB7-4ECD-9AEE-2DA1731889C2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x198A57
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14913 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1712658217-1322089911-2704141978-3263764595
	Account Name:		66151729-7DB7-4ECD-9AEE-2DA1731889C2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x198A57
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14912 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		66151729-7DB7-4ECD-9AEE-2DA1731889C2
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14911 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-1712658217-1322089911-2704141978-3263764595
	Account Name:		66151729-7DB7-4ECD-9AEE-2DA1731889C2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1989BC
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14910 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:25 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1712658217-1322089911-2704141978-3263764595
	Account Name:		66151729-7DB7-4ECD-9AEE-2DA1731889C2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1989BC
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14909 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1712658217-1322089911-2704141978-3263764595
	Account Name:		66151729-7DB7-4ECD-9AEE-2DA1731889C2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1989BC
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14908 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		66151729-7DB7-4ECD-9AEE-2DA1731889C2
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14907 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-1712658217-1322089911-2704141978-3263764595
	Account Name:		66151729-7DB7-4ECD-9AEE-2DA1731889C2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x19889E
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14906 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-1712658217-1322089911-2704141978-3263764595
	Account Name:		66151729-7DB7-4ECD-9AEE-2DA1731889C2
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x19889E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14905 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		66151729-7DB7-4ECD-9AEE-2DA1731889C2
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14904 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:06:25 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-746160222-1248541364-554111934-429684510
	Account Name:		2C79805E-3AB4-4A6B-BE13-07211E779C19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x174F69
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14903 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:59 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3180441094-1276939670-733852068-2138263078
	Account Name:		BD91AE06-8D96-4C1C-A4B1-BD2B264E737F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x11F672
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14902 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:44 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-746160222-1248541364-554111934-429684510
	Account Name:		2C79805E-3AB4-4A6B-BE13-07211E779C19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x17B8B0
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14901 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:38 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-746160222-1248541364-554111934-429684510
	Account Name:		2C79805E-3AB4-4A6B-BE13-07211E779C19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x17B8B0
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14900 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:38 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-746160222-1248541364-554111934-429684510
	Account Name:		2C79805E-3AB4-4A6B-BE13-07211E779C19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x17B8B0
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14899 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:38 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		2C79805E-3AB4-4A6B-BE13-07211E779C19
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14898 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:38 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x16531D
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14897 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:36 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x166A8C
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14896 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:36 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x16607C
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14895 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:30 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-746160222-1248541364-554111934-429684510
	Account Name:		2C79805E-3AB4-4A6B-BE13-07211E779C19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x17630F
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14894 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:30 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-746160222-1248541364-554111934-429684510
	Account Name:		2C79805E-3AB4-4A6B-BE13-07211E779C19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x17630F
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14893 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:30 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-746160222-1248541364-554111934-429684510
	Account Name:		2C79805E-3AB4-4A6B-BE13-07211E779C19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x17630F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14892 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:30 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		2C79805E-3AB4-4A6B-BE13-07211E779C19
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14891 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:30 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-746160222-1248541364-554111934-429684510
	Account Name:		2C79805E-3AB4-4A6B-BE13-07211E779C19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x174C0D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14890 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:30 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-746160222-1248541364-554111934-429684510
	Account Name:		2C79805E-3AB4-4A6B-BE13-07211E779C19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x174F69
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14889 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:30 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-746160222-1248541364-554111934-429684510
	Account Name:		2C79805E-3AB4-4A6B-BE13-07211E779C19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x174F69
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14888 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:30 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		2C79805E-3AB4-4A6B-BE13-07211E779C19
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14887 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:30 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-746160222-1248541364-554111934-429684510
	Account Name:		2C79805E-3AB4-4A6B-BE13-07211E779C19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x174E13
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14886 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:30 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-746160222-1248541364-554111934-429684510
	Account Name:		2C79805E-3AB4-4A6B-BE13-07211E779C19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x174E13
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14885 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:30 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-746160222-1248541364-554111934-429684510
	Account Name:		2C79805E-3AB4-4A6B-BE13-07211E779C19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x174E13
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14884 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:30 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		2C79805E-3AB4-4A6B-BE13-07211E779C19
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14883 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:30 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-746160222-1248541364-554111934-429684510
	Account Name:		2C79805E-3AB4-4A6B-BE13-07211E779C19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x174D2C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14882 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:30 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-746160222-1248541364-554111934-429684510
	Account Name:		2C79805E-3AB4-4A6B-BE13-07211E779C19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x174D2C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14881 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:30 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-746160222-1248541364-554111934-429684510
	Account Name:		2C79805E-3AB4-4A6B-BE13-07211E779C19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x174D2C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14880 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:30 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		2C79805E-3AB4-4A6B-BE13-07211E779C19
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14879 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:30 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-746160222-1248541364-554111934-429684510
	Account Name:		2C79805E-3AB4-4A6B-BE13-07211E779C19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x174C0D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14878 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:30 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-746160222-1248541364-554111934-429684510
	Account Name:		2C79805E-3AB4-4A6B-BE13-07211E779C19
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x174C0D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14877 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:30 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		2C79805E-3AB4-4A6B-BE13-07211E779C19
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14876 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:30 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-904669646-1109542989-719847599-3612377674
	Account Name:		35EC29CE-484D-4222-AF00-E82A4A8250D7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x134E23
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14875 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:29 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x165805
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14874 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:25 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3353252838-1192299626-1583393703-689446946
	Account Name:		C7DE93E6-0C6A-4711-A7AB-605E22201829
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x16E97E
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14873 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3353252838-1192299626-1583393703-689446946
	Account Name:		C7DE93E6-0C6A-4711-A7AB-605E22201829
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x16E97E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14872 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		C7DE93E6-0C6A-4711-A7AB-605E22201829
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14871 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:24 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x16AA63
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14870 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:21 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x16AA63
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14869 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x16AA63
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14868 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3353252838-1192299626-1583393703-689446946
	Account Name:		C7DE93E6-0C6A-4711-A7AB-605E22201829
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x16A862
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14867 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:21 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3353252838-1192299626-1583393703-689446946
	Account Name:		C7DE93E6-0C6A-4711-A7AB-605E22201829
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x16A862
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14866 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3353252838-1192299626-1583393703-689446946
	Account Name:		C7DE93E6-0C6A-4711-A7AB-605E22201829
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x16A862
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14865 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		C7DE93E6-0C6A-4711-A7AB-605E22201829
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14864 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3353252838-1192299626-1583393703-689446946
	Account Name:		C7DE93E6-0C6A-4711-A7AB-605E22201829
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x16A6BF
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14863 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:21 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3353252838-1192299626-1583393703-689446946
	Account Name:		C7DE93E6-0C6A-4711-A7AB-605E22201829
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x16A6BF
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14862 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3353252838-1192299626-1583393703-689446946
	Account Name:		C7DE93E6-0C6A-4711-A7AB-605E22201829
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x16A6BF
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14861 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		C7DE93E6-0C6A-4711-A7AB-605E22201829
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14860 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x166BA2
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14859 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x166BC7
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14858 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x166BB5
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14857 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		No
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x166BC7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{517EA6F4-2DE4-2D31-91B8-8F25D76164C9}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51995
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14856 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		No
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x166BB5
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{517EA6F4-2DE4-2D31-91B8-8F25D76164C9}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51994
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14855 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		No
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x166BA2
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{517EA6F4-2DE4-2D31-91B8-8F25D76164C9}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51993
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14854 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		No
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x166A8C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{517EA6F4-2DE4-2D31-91B8-8F25D76164C9}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51992
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14853 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		No
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x16607C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{0631BBD8-6A81-A0A2-F1CB-363B0C7185B2}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51992
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14852 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x165839
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14851 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		No
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x165839
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{0631BBD8-6A81-A0A2-F1CB-363B0C7185B2}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14850 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x165805
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14849 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x165805
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14848 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x165586
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51998
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14847 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x165586
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14846 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x165528
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51997
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14845 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x165528
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14844 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x165513
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51997
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14843 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x165513
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14842 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1654B8
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51997
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14841 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1654B8
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14840 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x165465
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51997
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14839 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x165465
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14838 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x165431
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51996
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14837 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x165431
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14836 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x165344
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14835 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x165355
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14834 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x165367
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14833 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x165367
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{07A26218-EC88-882C-1A5C-3DFA8432F918}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51995
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14832 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x165367
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14831 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x165355
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{07A26218-EC88-882C-1A5C-3DFA8432F918}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51994
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14830 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x165355
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14829 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x165344
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{07A26218-EC88-882C-1A5C-3DFA8432F918}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51993
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14828 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x165344
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14827 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x16531D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{07A26218-EC88-882C-1A5C-3DFA8432F918}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51992
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14826 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:19 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x16531D
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14825 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:19 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x15F726
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14824 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:16 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3353252838-1192299626-1583393703-689446946
	Account Name:		C7DE93E6-0C6A-4711-A7AB-605E22201829
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x15FB09
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14823 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:16 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3353252838-1192299626-1583393703-689446946
	Account Name:		C7DE93E6-0C6A-4711-A7AB-605E22201829
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x15FB09
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14822 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3353252838-1192299626-1583393703-689446946
	Account Name:		C7DE93E6-0C6A-4711-A7AB-605E22201829
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x15FB09
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14821 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		C7DE93E6-0C6A-4711-A7AB-605E22201829
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14820 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3353252838-1192299626-1583393703-689446946
	Account Name:		C7DE93E6-0C6A-4711-A7AB-605E22201829
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x15F7F5
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14819 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3353252838-1192299626-1583393703-689446946
	Account Name:		C7DE93E6-0C6A-4711-A7AB-605E22201829
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x15F7F5
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14818 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		C7DE93E6-0C6A-4711-A7AB-605E22201829
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14817 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x15F726
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{2F4466C5-FF05-AB38-19C6-3D9BE6414448}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	
		RestrictedKrbHost/chh2-832929-1@CBCI-832929-1.LOCAL
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14816 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x15F726
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14815 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:16 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2979673599-1236767303-2539081406-1682902445
	Account Name:		B19A35FF-9247-49B7-BE4E-5797AD0D4F64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x13920E
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14814 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:13 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2893411235-1291718627-2710047931-3817507517
	Account Name:		AC75F3A3-0FE3-4CFE-BB0C-88A1BD8A8AE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x144D6C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14813 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:13 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2979673599-1236767303-2539081406-1682902445
	Account Name:		B19A35FF-9247-49B7-BE4E-5797AD0D4F64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x14FAD5
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14812 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:10 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2979673599-1236767303-2539081406-1682902445
	Account Name:		B19A35FF-9247-49B7-BE4E-5797AD0D4F64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x14FAD5
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14811 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2979673599-1236767303-2539081406-1682902445
	Account Name:		B19A35FF-9247-49B7-BE4E-5797AD0D4F64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x14FAD5
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14810 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		B19A35FF-9247-49B7-BE4E-5797AD0D4F64
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14809 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2893411235-1291718627-2710047931-3817507517
	Account Name:		AC75F3A3-0FE3-4CFE-BB0C-88A1BD8A8AE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x147A48
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14808 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:06 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2893411235-1291718627-2710047931-3817507517
	Account Name:		AC75F3A3-0FE3-4CFE-BB0C-88A1BD8A8AE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x147A48
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14807 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:06 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2893411235-1291718627-2710047931-3817507517
	Account Name:		AC75F3A3-0FE3-4CFE-BB0C-88A1BD8A8AE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x147A48
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14806 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:06 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AC75F3A3-0FE3-4CFE-BB0C-88A1BD8A8AE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14805 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:06 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2893411235-1291718627-2710047931-3817507517
	Account Name:		AC75F3A3-0FE3-4CFE-BB0C-88A1BD8A8AE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x145B5D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14804 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:05 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2893411235-1291718627-2710047931-3817507517
	Account Name:		AC75F3A3-0FE3-4CFE-BB0C-88A1BD8A8AE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x145B5D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14803 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2893411235-1291718627-2710047931-3817507517
	Account Name:		AC75F3A3-0FE3-4CFE-BB0C-88A1BD8A8AE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x145B5D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14802 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AC75F3A3-0FE3-4CFE-BB0C-88A1BD8A8AE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14801 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x10114E
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14800 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x101139
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14799 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x101122
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14798 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x101111
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14797 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x101218
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14796 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x101185
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14795 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2893411235-1291718627-2710047931-3817507517
	Account Name:		AC75F3A3-0FE3-4CFE-BB0C-88A1BD8A8AE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x144C25
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14794 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2893411235-1291718627-2710047931-3817507517
	Account Name:		AC75F3A3-0FE3-4CFE-BB0C-88A1BD8A8AE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x144D6C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14793 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2893411235-1291718627-2710047931-3817507517
	Account Name:		AC75F3A3-0FE3-4CFE-BB0C-88A1BD8A8AE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x144D6C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14792 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AC75F3A3-0FE3-4CFE-BB0C-88A1BD8A8AE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14791 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2893411235-1291718627-2710047931-3817507517
	Account Name:		AC75F3A3-0FE3-4CFE-BB0C-88A1BD8A8AE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x144D13
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14790 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2893411235-1291718627-2710047931-3817507517
	Account Name:		AC75F3A3-0FE3-4CFE-BB0C-88A1BD8A8AE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x144D13
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14789 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2893411235-1291718627-2710047931-3817507517
	Account Name:		AC75F3A3-0FE3-4CFE-BB0C-88A1BD8A8AE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x144D13
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14788 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AC75F3A3-0FE3-4CFE-BB0C-88A1BD8A8AE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14787 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2893411235-1291718627-2710047931-3817507517
	Account Name:		AC75F3A3-0FE3-4CFE-BB0C-88A1BD8A8AE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x144CCA
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14786 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2893411235-1291718627-2710047931-3817507517
	Account Name:		AC75F3A3-0FE3-4CFE-BB0C-88A1BD8A8AE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x144CCA
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14785 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2893411235-1291718627-2710047931-3817507517
	Account Name:		AC75F3A3-0FE3-4CFE-BB0C-88A1BD8A8AE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x144CCA
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14784 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AC75F3A3-0FE3-4CFE-BB0C-88A1BD8A8AE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14783 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2893411235-1291718627-2710047931-3817507517
	Account Name:		AC75F3A3-0FE3-4CFE-BB0C-88A1BD8A8AE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x144C25
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14782 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2893411235-1291718627-2710047931-3817507517
	Account Name:		AC75F3A3-0FE3-4CFE-BB0C-88A1BD8A8AE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x144C25
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14781 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		AC75F3A3-0FE3-4CFE-BB0C-88A1BD8A8AE3
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14780 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-535873945-1136779595-3085035708-2519420345
	Account Name:		1FF0C999-E14B-43C1-BCE8-E1B7B94D2B96
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x126997
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14779 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:03 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2979673599-1236767303-2539081406-1682902445
	Account Name:		B19A35FF-9247-49B7-BE4E-5797AD0D4F64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x14021A
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14778 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:01 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2979673599-1236767303-2539081406-1682902445
	Account Name:		B19A35FF-9247-49B7-BE4E-5797AD0D4F64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x14021A
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14777 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2979673599-1236767303-2539081406-1682902445
	Account Name:		B19A35FF-9247-49B7-BE4E-5797AD0D4F64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x14021A
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14776 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		B19A35FF-9247-49B7-BE4E-5797AD0D4F64
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14775 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:05:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-904669646-1109542989-719847599-3612377674
	Account Name:		35EC29CE-484D-4222-AF00-E82A4A8250D7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x13BCE2
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14774 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:55 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-904669646-1109542989-719847599-3612377674
	Account Name:		35EC29CE-484D-4222-AF00-E82A4A8250D7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x13BCE2
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14773 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-904669646-1109542989-719847599-3612377674
	Account Name:		35EC29CE-484D-4222-AF00-E82A4A8250D7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x13BCE2
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14772 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		35EC29CE-484D-4222-AF00-E82A4A8250D7
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14771 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2979673599-1236767303-2539081406-1682902445
	Account Name:		B19A35FF-9247-49B7-BE4E-5797AD0D4F64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x13A0C7
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14770 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:54 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2979673599-1236767303-2539081406-1682902445
	Account Name:		B19A35FF-9247-49B7-BE4E-5797AD0D4F64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x13A0C7
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14769 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2979673599-1236767303-2539081406-1682902445
	Account Name:		B19A35FF-9247-49B7-BE4E-5797AD0D4F64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x13A0C7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14768 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		B19A35FF-9247-49B7-BE4E-5797AD0D4F64
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14767 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2979673599-1236767303-2539081406-1682902445
	Account Name:		B19A35FF-9247-49B7-BE4E-5797AD0D4F64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1390C7
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14766 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:53 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2979673599-1236767303-2539081406-1682902445
	Account Name:		B19A35FF-9247-49B7-BE4E-5797AD0D4F64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x13920E
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14765 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2979673599-1236767303-2539081406-1682902445
	Account Name:		B19A35FF-9247-49B7-BE4E-5797AD0D4F64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x13920E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14764 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		B19A35FF-9247-49B7-BE4E-5797AD0D4F64
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14763 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2979673599-1236767303-2539081406-1682902445
	Account Name:		B19A35FF-9247-49B7-BE4E-5797AD0D4F64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1391B5
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14762 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:53 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2979673599-1236767303-2539081406-1682902445
	Account Name:		B19A35FF-9247-49B7-BE4E-5797AD0D4F64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1391B5
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14761 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2979673599-1236767303-2539081406-1682902445
	Account Name:		B19A35FF-9247-49B7-BE4E-5797AD0D4F64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1391B5
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14760 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		B19A35FF-9247-49B7-BE4E-5797AD0D4F64
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14759 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2979673599-1236767303-2539081406-1682902445
	Account Name:		B19A35FF-9247-49B7-BE4E-5797AD0D4F64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x13916C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14758 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:53 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2979673599-1236767303-2539081406-1682902445
	Account Name:		B19A35FF-9247-49B7-BE4E-5797AD0D4F64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x13916C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14757 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2979673599-1236767303-2539081406-1682902445
	Account Name:		B19A35FF-9247-49B7-BE4E-5797AD0D4F64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x13916C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14756 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		B19A35FF-9247-49B7-BE4E-5797AD0D4F64
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14755 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2979673599-1236767303-2539081406-1682902445
	Account Name:		B19A35FF-9247-49B7-BE4E-5797AD0D4F64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1390C7
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14754 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2979673599-1236767303-2539081406-1682902445
	Account Name:		B19A35FF-9247-49B7-BE4E-5797AD0D4F64
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1390C7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14753 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		B19A35FF-9247-49B7-BE4E-5797AD0D4F64
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14752 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:53 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-904669646-1109542989-719847599-3612377674
	Account Name:		35EC29CE-484D-4222-AF00-E82A4A8250D7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x135C62
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14751 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:44 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-904669646-1109542989-719847599-3612377674
	Account Name:		35EC29CE-484D-4222-AF00-E82A4A8250D7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x135C62
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14750 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-904669646-1109542989-719847599-3612377674
	Account Name:		35EC29CE-484D-4222-AF00-E82A4A8250D7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x135C62
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14749 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		35EC29CE-484D-4222-AF00-E82A4A8250D7
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14748 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-904669646-1109542989-719847599-3612377674
	Account Name:		35EC29CE-484D-4222-AF00-E82A4A8250D7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x134CCA
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14747 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:44 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-904669646-1109542989-719847599-3612377674
	Account Name:		35EC29CE-484D-4222-AF00-E82A4A8250D7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x134E23
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14746 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:43 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-904669646-1109542989-719847599-3612377674
	Account Name:		35EC29CE-484D-4222-AF00-E82A4A8250D7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x134E23
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14745 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:43 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		35EC29CE-484D-4222-AF00-E82A4A8250D7
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14744 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:43 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-904669646-1109542989-719847599-3612377674
	Account Name:		35EC29CE-484D-4222-AF00-E82A4A8250D7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x134DB8
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14743 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:43 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-904669646-1109542989-719847599-3612377674
	Account Name:		35EC29CE-484D-4222-AF00-E82A4A8250D7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x134DB8
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14742 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:43 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-904669646-1109542989-719847599-3612377674
	Account Name:		35EC29CE-484D-4222-AF00-E82A4A8250D7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x134DB8
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14741 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:43 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		35EC29CE-484D-4222-AF00-E82A4A8250D7
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14740 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:43 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-904669646-1109542989-719847599-3612377674
	Account Name:		35EC29CE-484D-4222-AF00-E82A4A8250D7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x134D6F
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14739 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:43 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-904669646-1109542989-719847599-3612377674
	Account Name:		35EC29CE-484D-4222-AF00-E82A4A8250D7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x134D6F
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14738 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:43 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-904669646-1109542989-719847599-3612377674
	Account Name:		35EC29CE-484D-4222-AF00-E82A4A8250D7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x134D6F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14737 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:43 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		35EC29CE-484D-4222-AF00-E82A4A8250D7
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14736 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:43 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-904669646-1109542989-719847599-3612377674
	Account Name:		35EC29CE-484D-4222-AF00-E82A4A8250D7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x134CCA
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14735 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:43 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-904669646-1109542989-719847599-3612377674
	Account Name:		35EC29CE-484D-4222-AF00-E82A4A8250D7
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x134CCA
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14734 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:43 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		35EC29CE-484D-4222-AF00-E82A4A8250D7
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14733 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:43 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3456344383-1165444422-1421916572-2353315763
	Account Name:		CE03A13F-4546-4577-9CB9-C054B3BF448C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x116CFB
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14732 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:43 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3823925017-1322748882-2436594574-3222037398
	Account Name:		E3EC7719-8BD2-4ED7-8E7B-3B9196630CC0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10AE8F
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14731 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:38 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-535873945-1136779595-3085035708-2519420345
	Account Name:		1FF0C999-E14B-43C1-BCE8-E1B7B94D2B96
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x12AC4F
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14730 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:29 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-535873945-1136779595-3085035708-2519420345
	Account Name:		1FF0C999-E14B-43C1-BCE8-E1B7B94D2B96
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x12AC4F
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14729 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:29 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-535873945-1136779595-3085035708-2519420345
	Account Name:		1FF0C999-E14B-43C1-BCE8-E1B7B94D2B96
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x12AC4F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14728 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:29 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1FF0C999-E14B-43C1-BCE8-E1B7B94D2B96
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14727 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:29 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-535873945-1136779595-3085035708-2519420345
	Account Name:		1FF0C999-E14B-43C1-BCE8-E1B7B94D2B96
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x128754
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14726 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:28 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-535873945-1136779595-3085035708-2519420345
	Account Name:		1FF0C999-E14B-43C1-BCE8-E1B7B94D2B96
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x128754
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14725 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:28 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-535873945-1136779595-3085035708-2519420345
	Account Name:		1FF0C999-E14B-43C1-BCE8-E1B7B94D2B96
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x128754
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14724 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:28 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1FF0C999-E14B-43C1-BCE8-E1B7B94D2B96
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14723 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:28 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3180441094-1276939670-733852068-2138263078
	Account Name:		BD91AE06-8D96-4C1C-A4B1-BD2B264E737F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x12741D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14722 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:28 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3180441094-1276939670-733852068-2138263078
	Account Name:		BD91AE06-8D96-4C1C-A4B1-BD2B264E737F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x12741D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14721 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:28 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3180441094-1276939670-733852068-2138263078
	Account Name:		BD91AE06-8D96-4C1C-A4B1-BD2B264E737F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x12741D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14720 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:28 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		BD91AE06-8D96-4C1C-A4B1-BD2B264E737F
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14719 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:28 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-535873945-1136779595-3085035708-2519420345
	Account Name:		1FF0C999-E14B-43C1-BCE8-E1B7B94D2B96
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1263BA
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14718 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:27 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-535873945-1136779595-3085035708-2519420345
	Account Name:		1FF0C999-E14B-43C1-BCE8-E1B7B94D2B96
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x126997
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14717 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-535873945-1136779595-3085035708-2519420345
	Account Name:		1FF0C999-E14B-43C1-BCE8-E1B7B94D2B96
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x126997
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14716 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1FF0C999-E14B-43C1-BCE8-E1B7B94D2B96
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14715 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-535873945-1136779595-3085035708-2519420345
	Account Name:		1FF0C999-E14B-43C1-BCE8-E1B7B94D2B96
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x126793
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14714 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:27 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-535873945-1136779595-3085035708-2519420345
	Account Name:		1FF0C999-E14B-43C1-BCE8-E1B7B94D2B96
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x126793
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14713 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-535873945-1136779595-3085035708-2519420345
	Account Name:		1FF0C999-E14B-43C1-BCE8-E1B7B94D2B96
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x126793
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14712 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1FF0C999-E14B-43C1-BCE8-E1B7B94D2B96
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14711 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-535873945-1136779595-3085035708-2519420345
	Account Name:		1FF0C999-E14B-43C1-BCE8-E1B7B94D2B96
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x126660
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14710 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:27 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-535873945-1136779595-3085035708-2519420345
	Account Name:		1FF0C999-E14B-43C1-BCE8-E1B7B94D2B96
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x126660
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14709 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-535873945-1136779595-3085035708-2519420345
	Account Name:		1FF0C999-E14B-43C1-BCE8-E1B7B94D2B96
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x126660
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14708 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1FF0C999-E14B-43C1-BCE8-E1B7B94D2B96
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14707 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-535873945-1136779595-3085035708-2519420345
	Account Name:		1FF0C999-E14B-43C1-BCE8-E1B7B94D2B96
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1263BA
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14706 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-535873945-1136779595-3085035708-2519420345
	Account Name:		1FF0C999-E14B-43C1-BCE8-E1B7B94D2B96
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1263BA
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14705 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		1FF0C999-E14B-43C1-BCE8-E1B7B94D2B96
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14704 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:27 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3778019941-1244420198-1228722602-3021769176
	Account Name:		E1300265-5866-4A2C-AAD1-3C49D8891CB4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10F08A
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14703 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:26 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3180441094-1276939670-733852068-2138263078
	Account Name:		BD91AE06-8D96-4C1C-A4B1-BD2B264E737F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1208F2
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14702 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:21 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3180441094-1276939670-733852068-2138263078
	Account Name:		BD91AE06-8D96-4C1C-A4B1-BD2B264E737F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1208F2
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14701 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3180441094-1276939670-733852068-2138263078
	Account Name:		BD91AE06-8D96-4C1C-A4B1-BD2B264E737F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1208F2
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14700 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		BD91AE06-8D96-4C1C-A4B1-BD2B264E737F
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14699 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:21 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3180441094-1276939670-733852068-2138263078
	Account Name:		BD91AE06-8D96-4C1C-A4B1-BD2B264E737F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x11F4DC
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14698 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:20 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3180441094-1276939670-733852068-2138263078
	Account Name:		BD91AE06-8D96-4C1C-A4B1-BD2B264E737F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x11F672
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14697 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3180441094-1276939670-733852068-2138263078
	Account Name:		BD91AE06-8D96-4C1C-A4B1-BD2B264E737F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x11F672
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14696 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		BD91AE06-8D96-4C1C-A4B1-BD2B264E737F
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14695 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3180441094-1276939670-733852068-2138263078
	Account Name:		BD91AE06-8D96-4C1C-A4B1-BD2B264E737F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x11F5CF
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14694 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:20 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3180441094-1276939670-733852068-2138263078
	Account Name:		BD91AE06-8D96-4C1C-A4B1-BD2B264E737F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x11F5CF
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14693 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3180441094-1276939670-733852068-2138263078
	Account Name:		BD91AE06-8D96-4C1C-A4B1-BD2B264E737F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x11F5CF
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14692 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		BD91AE06-8D96-4C1C-A4B1-BD2B264E737F
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14691 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3180441094-1276939670-733852068-2138263078
	Account Name:		BD91AE06-8D96-4C1C-A4B1-BD2B264E737F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x11F586
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14690 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:20 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3180441094-1276939670-733852068-2138263078
	Account Name:		BD91AE06-8D96-4C1C-A4B1-BD2B264E737F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x11F586
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14689 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3180441094-1276939670-733852068-2138263078
	Account Name:		BD91AE06-8D96-4C1C-A4B1-BD2B264E737F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x11F586
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14688 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		BD91AE06-8D96-4C1C-A4B1-BD2B264E737F
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14687 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3180441094-1276939670-733852068-2138263078
	Account Name:		BD91AE06-8D96-4C1C-A4B1-BD2B264E737F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x11F4DC
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14686 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3180441094-1276939670-733852068-2138263078
	Account Name:		BD91AE06-8D96-4C1C-A4B1-BD2B264E737F
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x11F4DC
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14685 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		BD91AE06-8D96-4C1C-A4B1-BD2B264E737F
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14684 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:20 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3456344383-1165444422-1421916572-2353315763
	Account Name:		CE03A13F-4546-4577-9CB9-C054B3BF448C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x11B30C
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14683 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:09 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3456344383-1165444422-1421916572-2353315763
	Account Name:		CE03A13F-4546-4577-9CB9-C054B3BF448C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x11B30C
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14682 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3456344383-1165444422-1421916572-2353315763
	Account Name:		CE03A13F-4546-4577-9CB9-C054B3BF448C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x11B30C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14681 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		CE03A13F-4546-4577-9CB9-C054B3BF448C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14680 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:09 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3456344383-1165444422-1421916572-2353315763
	Account Name:		CE03A13F-4546-4577-9CB9-C054B3BF448C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x117B86
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14679 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:01 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3456344383-1165444422-1421916572-2353315763
	Account Name:		CE03A13F-4546-4577-9CB9-C054B3BF448C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x117B86
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14678 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3456344383-1165444422-1421916572-2353315763
	Account Name:		CE03A13F-4546-4577-9CB9-C054B3BF448C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x117B86
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14677 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		CE03A13F-4546-4577-9CB9-C054B3BF448C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14676 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3456344383-1165444422-1421916572-2353315763
	Account Name:		CE03A13F-4546-4577-9CB9-C054B3BF448C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x116B2B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14675 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:00 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3456344383-1165444422-1421916572-2353315763
	Account Name:		CE03A13F-4546-4577-9CB9-C054B3BF448C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x116CFB
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14674 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3456344383-1165444422-1421916572-2353315763
	Account Name:		CE03A13F-4546-4577-9CB9-C054B3BF448C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x116CFB
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14673 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		CE03A13F-4546-4577-9CB9-C054B3BF448C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14672 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3456344383-1165444422-1421916572-2353315763
	Account Name:		CE03A13F-4546-4577-9CB9-C054B3BF448C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x116CA2
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14671 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:00 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3456344383-1165444422-1421916572-2353315763
	Account Name:		CE03A13F-4546-4577-9CB9-C054B3BF448C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x116CA2
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14670 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3456344383-1165444422-1421916572-2353315763
	Account Name:		CE03A13F-4546-4577-9CB9-C054B3BF448C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x116CA2
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14669 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		CE03A13F-4546-4577-9CB9-C054B3BF448C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14668 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3456344383-1165444422-1421916572-2353315763
	Account Name:		CE03A13F-4546-4577-9CB9-C054B3BF448C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x116BE7
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14667 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:00 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3456344383-1165444422-1421916572-2353315763
	Account Name:		CE03A13F-4546-4577-9CB9-C054B3BF448C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x116BE7
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14666 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3456344383-1165444422-1421916572-2353315763
	Account Name:		CE03A13F-4546-4577-9CB9-C054B3BF448C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x116BE7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14665 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		CE03A13F-4546-4577-9CB9-C054B3BF448C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14664 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3456344383-1165444422-1421916572-2353315763
	Account Name:		CE03A13F-4546-4577-9CB9-C054B3BF448C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x116B2B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14663 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3456344383-1165444422-1421916572-2353315763
	Account Name:		CE03A13F-4546-4577-9CB9-C054B3BF448C
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x116B2B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14662 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		CE03A13F-4546-4577-9CB9-C054B3BF448C
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14661 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:04:00 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0xE7DA5
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14660 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:58 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3823925017-1322748882-2436594574-3222037398
	Account Name:		E3EC7719-8BD2-4ED7-8E7B-3B9196630CC0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x114AD4
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14659 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:54 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3823925017-1322748882-2436594574-3222037398
	Account Name:		E3EC7719-8BD2-4ED7-8E7B-3B9196630CC0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x114AD4
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14658 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3823925017-1322748882-2436594574-3222037398
	Account Name:		E3EC7719-8BD2-4ED7-8E7B-3B9196630CC0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x114AD4
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14657 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E3EC7719-8BD2-4ED7-8E7B-3B9196630CC0
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14656 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:54 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x10109F
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14655 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:53 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x10217F
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14654 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:53 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3778019941-1244420198-1228722602-3021769176
	Account Name:		E1300265-5866-4A2C-AAD1-3C49D8891CB4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1122E6
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14653 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:50 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3778019941-1244420198-1228722602-3021769176
	Account Name:		E1300265-5866-4A2C-AAD1-3C49D8891CB4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1122E6
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14652 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:50 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3778019941-1244420198-1228722602-3021769176
	Account Name:		E1300265-5866-4A2C-AAD1-3C49D8891CB4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1122E6
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14651 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:50 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E1300265-5866-4A2C-AAD1-3C49D8891CB4
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14650 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:50 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3778019941-1244420198-1228722602-3021769176
	Account Name:		E1300265-5866-4A2C-AAD1-3C49D8891CB4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x110180
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14649 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:49 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3778019941-1244420198-1228722602-3021769176
	Account Name:		E1300265-5866-4A2C-AAD1-3C49D8891CB4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x110180
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14648 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3778019941-1244420198-1228722602-3021769176
	Account Name:		E1300265-5866-4A2C-AAD1-3C49D8891CB4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x110180
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14647 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E1300265-5866-4A2C-AAD1-3C49D8891CB4
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14646 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3778019941-1244420198-1228722602-3021769176
	Account Name:		E1300265-5866-4A2C-AAD1-3C49D8891CB4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10EEB4
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14645 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:49 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3778019941-1244420198-1228722602-3021769176
	Account Name:		E1300265-5866-4A2C-AAD1-3C49D8891CB4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10F08A
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14644 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3778019941-1244420198-1228722602-3021769176
	Account Name:		E1300265-5866-4A2C-AAD1-3C49D8891CB4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10F08A
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14643 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E1300265-5866-4A2C-AAD1-3C49D8891CB4
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14642 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3778019941-1244420198-1228722602-3021769176
	Account Name:		E1300265-5866-4A2C-AAD1-3C49D8891CB4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10F031
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14641 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:49 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3778019941-1244420198-1228722602-3021769176
	Account Name:		E1300265-5866-4A2C-AAD1-3C49D8891CB4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10F031
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14640 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3778019941-1244420198-1228722602-3021769176
	Account Name:		E1300265-5866-4A2C-AAD1-3C49D8891CB4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10F031
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14639 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E1300265-5866-4A2C-AAD1-3C49D8891CB4
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14638 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3778019941-1244420198-1228722602-3021769176
	Account Name:		E1300265-5866-4A2C-AAD1-3C49D8891CB4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10EFE8
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14637 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:49 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3778019941-1244420198-1228722602-3021769176
	Account Name:		E1300265-5866-4A2C-AAD1-3C49D8891CB4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10EFE8
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14636 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3778019941-1244420198-1228722602-3021769176
	Account Name:		E1300265-5866-4A2C-AAD1-3C49D8891CB4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10EFE8
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14635 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E1300265-5866-4A2C-AAD1-3C49D8891CB4
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14634 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3778019941-1244420198-1228722602-3021769176
	Account Name:		E1300265-5866-4A2C-AAD1-3C49D8891CB4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10EEB4
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14633 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3778019941-1244420198-1228722602-3021769176
	Account Name:		E1300265-5866-4A2C-AAD1-3C49D8891CB4
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10EEB4
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14632 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E1300265-5866-4A2C-AAD1-3C49D8891CB4
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14631 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x101988
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14630 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:48 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3823925017-1322748882-2436594574-3222037398
	Account Name:		E3EC7719-8BD2-4ED7-8E7B-3B9196630CC0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10C376
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14629 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:45 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3823925017-1322748882-2436594574-3222037398
	Account Name:		E3EC7719-8BD2-4ED7-8E7B-3B9196630CC0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10C376
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14628 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3823925017-1322748882-2436594574-3222037398
	Account Name:		E3EC7719-8BD2-4ED7-8E7B-3B9196630CC0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10C376
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14627 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E3EC7719-8BD2-4ED7-8E7B-3B9196630CC0
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14626 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3823925017-1322748882-2436594574-3222037398
	Account Name:		E3EC7719-8BD2-4ED7-8E7B-3B9196630CC0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10BBBB
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14625 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:44 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3823925017-1322748882-2436594574-3222037398
	Account Name:		E3EC7719-8BD2-4ED7-8E7B-3B9196630CC0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10BBBB
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14624 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3823925017-1322748882-2436594574-3222037398
	Account Name:		E3EC7719-8BD2-4ED7-8E7B-3B9196630CC0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10BBBB
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14623 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E3EC7719-8BD2-4ED7-8E7B-3B9196630CC0
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14622 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3823925017-1322748882-2436594574-3222037398
	Account Name:		E3EC7719-8BD2-4ED7-8E7B-3B9196630CC0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10AD48
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14621 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:44 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3823925017-1322748882-2436594574-3222037398
	Account Name:		E3EC7719-8BD2-4ED7-8E7B-3B9196630CC0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10AE8F
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14620 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3823925017-1322748882-2436594574-3222037398
	Account Name:		E3EC7719-8BD2-4ED7-8E7B-3B9196630CC0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10AE8F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14619 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E3EC7719-8BD2-4ED7-8E7B-3B9196630CC0
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14618 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3823925017-1322748882-2436594574-3222037398
	Account Name:		E3EC7719-8BD2-4ED7-8E7B-3B9196630CC0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10AE36
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14617 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:44 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3823925017-1322748882-2436594574-3222037398
	Account Name:		E3EC7719-8BD2-4ED7-8E7B-3B9196630CC0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10AE36
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14616 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3823925017-1322748882-2436594574-3222037398
	Account Name:		E3EC7719-8BD2-4ED7-8E7B-3B9196630CC0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10AE36
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14615 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E3EC7719-8BD2-4ED7-8E7B-3B9196630CC0
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14614 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-3823925017-1322748882-2436594574-3222037398
	Account Name:		E3EC7719-8BD2-4ED7-8E7B-3B9196630CC0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10ADED
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14613 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:44 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3823925017-1322748882-2436594574-3222037398
	Account Name:		E3EC7719-8BD2-4ED7-8E7B-3B9196630CC0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10ADED
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14612 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3823925017-1322748882-2436594574-3222037398
	Account Name:		E3EC7719-8BD2-4ED7-8E7B-3B9196630CC0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10ADED
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14611 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E3EC7719-8BD2-4ED7-8E7B-3B9196630CC0
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14610 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-3823925017-1322748882-2436594574-3222037398
	Account Name:		E3EC7719-8BD2-4ED7-8E7B-3B9196630CC0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10AD48
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14609 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-3823925017-1322748882-2436594574-3222037398
	Account Name:		E3EC7719-8BD2-4ED7-8E7B-3B9196630CC0
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10AD48
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14608 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		E3EC7719-8BD2-4ED7-8E7B-3B9196630CC0
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14607 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:44 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1012B2
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14606 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:40 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2411394095-1193362761-3538267068-2002547266
	Account Name:		8FBAF42F-4549-4721-BCAB-E5D242725C77
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10A420
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14605 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2411394095-1193362761-3538267068-2002547266
	Account Name:		8FBAF42F-4549-4721-BCAB-E5D242725C77
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x10A420
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14604 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		8FBAF42F-4549-4721-BCAB-E5D242725C77
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14603 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:40 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1065EF
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14602 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:39 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1065EF
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14601 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1065EF
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14600 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2411394095-1193362761-3538267068-2002547266
	Account Name:		8FBAF42F-4549-4721-BCAB-E5D242725C77
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x106258
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14599 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:39 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2411394095-1193362761-3538267068-2002547266
	Account Name:		8FBAF42F-4549-4721-BCAB-E5D242725C77
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x106258
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14598 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2411394095-1193362761-3538267068-2002547266
	Account Name:		8FBAF42F-4549-4721-BCAB-E5D242725C77
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x106258
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14597 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		8FBAF42F-4549-4721-BCAB-E5D242725C77
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14596 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2411394095-1193362761-3538267068-2002547266
	Account Name:		8FBAF42F-4549-4721-BCAB-E5D242725C77
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x105FE9
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14595 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:39 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2411394095-1193362761-3538267068-2002547266
	Account Name:		8FBAF42F-4549-4721-BCAB-E5D242725C77
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x105FE9
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14594 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2411394095-1193362761-3538267068-2002547266
	Account Name:		8FBAF42F-4549-4721-BCAB-E5D242725C77
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x105FE9
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14593 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		8FBAF42F-4549-4721-BCAB-E5D242725C77
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14592 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:39 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1022AA
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14591 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:38 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1022BA
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14590 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:38 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x10229D
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14589 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:38 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		No
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1022BA
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{CEB70348-0800-E859-A543-0EC2A2DD3C23}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51935
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14588 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:38 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		No
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1022AA
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{CEB70348-0800-E859-A543-0EC2A2DD3C23}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51936
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14587 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:38 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		No
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x10229D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{CEB70348-0800-E859-A543-0EC2A2DD3C23}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51937
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14586 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:38 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		No
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x10217F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{CEB70348-0800-E859-A543-0EC2A2DD3C23}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51934
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14585 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:38 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		No
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x101988
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{0631BBD8-6A81-A0A2-F1CB-363B0C7185B2}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51934
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14584 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x10139A
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14583 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		No
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x10139A
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{0631BBD8-6A81-A0A2-F1CB-363B0C7185B2}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14582 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2411394095-1193362761-3538267068-2002547266
	Account Name:		8FBAF42F-4549-4721-BCAB-E5D242725C77
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x101332
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14581 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2411394095-1193362761-3538267068-2002547266
	Account Name:		8FBAF42F-4549-4721-BCAB-E5D242725C77
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x101332
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14580 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2411394095-1193362761-3538267068-2002547266
	Account Name:		8FBAF42F-4549-4721-BCAB-E5D242725C77
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x101332
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14579 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		8FBAF42F-4549-4721-BCAB-E5D242725C77
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14578 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2411394095-1193362761-3538267068-2002547266
	Account Name:		8FBAF42F-4549-4721-BCAB-E5D242725C77
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1012DF
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14577 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2411394095-1193362761-3538267068-2002547266
	Account Name:		8FBAF42F-4549-4721-BCAB-E5D242725C77
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0x1012DF
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14576 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		8FBAF42F-4549-4721-BCAB-E5D242725C77
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14575 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1012B2
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14574 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1012B2
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14573 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x101218
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51939
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14572 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x101218
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14571 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x101185
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51939
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14570 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x101185
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14569 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x10114E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51938
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14568 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x10114E
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14567 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x101139
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51938
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14566 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x101139
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14565 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x101122
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51938
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14564 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x101122
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14563 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x101111
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51938
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14562 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x101111
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14561 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1010EB
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14560 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1010D0
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14559 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1010E0
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14558 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1010EB
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{07A26218-EC88-882C-1A5C-3DFA8432F918}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51936
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14557 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1010E0
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{07A26218-EC88-882C-1A5C-3DFA8432F918}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51937
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14556 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1010EB
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14555 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1010E0
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14554 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1010D0
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{07A26218-EC88-882C-1A5C-3DFA8432F918}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51935
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14553 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1010D0
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14552 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x10109F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{07A26218-EC88-882C-1A5C-3DFA8432F918}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51934
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14551 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x10109F
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14550 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0xE7F69
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14549 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0xE7F54
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14548 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0xE8033
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14547 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0xE7F3D
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14546 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0xE7F2C
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14545 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0xE7FA0
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14544 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:34 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2628593945-1095711297-1556361889-617851208
	Account Name:		9CAD2919-3A41-414F-A132-C45C48A9D324
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xF3E89
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14543 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:20 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2628593945-1095711297-1556361889-617851208
	Account Name:		9CAD2919-3A41-414F-A132-C45C48A9D324
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xF948E
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14542 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:12 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2628593945-1095711297-1556361889-617851208
	Account Name:		9CAD2919-3A41-414F-A132-C45C48A9D324
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xF948E
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14541 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2628593945-1095711297-1556361889-617851208
	Account Name:		9CAD2919-3A41-414F-A132-C45C48A9D324
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xF948E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14540 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		9CAD2919-3A41-414F-A132-C45C48A9D324
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14539 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2628593945-1095711297-1556361889-617851208
	Account Name:		9CAD2919-3A41-414F-A132-C45C48A9D324
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xF4BB3
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14538 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2628593945-1095711297-1556361889-617851208
	Account Name:		9CAD2919-3A41-414F-A132-C45C48A9D324
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xF4BB3
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14537 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2628593945-1095711297-1556361889-617851208
	Account Name:		9CAD2919-3A41-414F-A132-C45C48A9D324
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xF4BB3
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14536 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		9CAD2919-3A41-414F-A132-C45C48A9D324
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14535 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2628593945-1095711297-1556361889-617851208
	Account Name:		9CAD2919-3A41-414F-A132-C45C48A9D324
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xF3D35
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14534 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:03 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2628593945-1095711297-1556361889-617851208
	Account Name:		9CAD2919-3A41-414F-A132-C45C48A9D324
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xF3E89
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14533 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2628593945-1095711297-1556361889-617851208
	Account Name:		9CAD2919-3A41-414F-A132-C45C48A9D324
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xF3E89
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14532 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		9CAD2919-3A41-414F-A132-C45C48A9D324
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14531 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2628593945-1095711297-1556361889-617851208
	Account Name:		9CAD2919-3A41-414F-A132-C45C48A9D324
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xF3E30
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14530 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:03 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2628593945-1095711297-1556361889-617851208
	Account Name:		9CAD2919-3A41-414F-A132-C45C48A9D324
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xF3E30
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14529 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2628593945-1095711297-1556361889-617851208
	Account Name:		9CAD2919-3A41-414F-A132-C45C48A9D324
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xF3E30
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14528 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		9CAD2919-3A41-414F-A132-C45C48A9D324
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14527 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2628593945-1095711297-1556361889-617851208
	Account Name:		9CAD2919-3A41-414F-A132-C45C48A9D324
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xF3DE3
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14526 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:03 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2628593945-1095711297-1556361889-617851208
	Account Name:		9CAD2919-3A41-414F-A132-C45C48A9D324
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xF3DE3
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14525 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2628593945-1095711297-1556361889-617851208
	Account Name:		9CAD2919-3A41-414F-A132-C45C48A9D324
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xF3DE3
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14524 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		9CAD2919-3A41-414F-A132-C45C48A9D324
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14523 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2628593945-1095711297-1556361889-617851208
	Account Name:		9CAD2919-3A41-414F-A132-C45C48A9D324
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xF3D35
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14522 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2628593945-1095711297-1556361889-617851208
	Account Name:		9CAD2919-3A41-414F-A132-C45C48A9D324
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xF3D35
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14521 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		9CAD2919-3A41-414F-A132-C45C48A9D324
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14520 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0xE7D22
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14519 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:01 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0xE9379
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14518 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:01 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0xE8DDE
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14517 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:03:01 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0xE80CA
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14516 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:51 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2049388200-1256274133-2677750962-3315280009
	Account Name:		7A272EA8-38D5-4AE1-B23C-9B9F89289BC5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xEEC77
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14515 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:50 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2049388200-1256274133-2677750962-3315280009
	Account Name:		7A272EA8-38D5-4AE1-B23C-9B9F89289BC5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xEEC77
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14514 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:50 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		7A272EA8-38D5-4AE1-B23C-9B9F89289BC5
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14513 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:50 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0xEBBA5
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14512 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:48 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0xEBBA5
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14511 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:48 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0xEBBA5
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14510 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:48 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2049388200-1256274133-2677750962-3315280009
	Account Name:		7A272EA8-38D5-4AE1-B23C-9B9F89289BC5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xEB7E3
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14509 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:48 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2049388200-1256274133-2677750962-3315280009
	Account Name:		7A272EA8-38D5-4AE1-B23C-9B9F89289BC5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xEB7E3
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14508 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:48 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2049388200-1256274133-2677750962-3315280009
	Account Name:		7A272EA8-38D5-4AE1-B23C-9B9F89289BC5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xEB7E3
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14507 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:48 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		7A272EA8-38D5-4AE1-B23C-9B9F89289BC5
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14506 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:48 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2049388200-1256274133-2677750962-3315280009
	Account Name:		7A272EA8-38D5-4AE1-B23C-9B9F89289BC5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xEB634
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14505 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:48 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2049388200-1256274133-2677750962-3315280009
	Account Name:		7A272EA8-38D5-4AE1-B23C-9B9F89289BC5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xEB634
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14504 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:48 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2049388200-1256274133-2677750962-3315280009
	Account Name:		7A272EA8-38D5-4AE1-B23C-9B9F89289BC5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xEB634
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14503 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:48 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		7A272EA8-38D5-4AE1-B23C-9B9F89289BC5
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14502 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:48 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0xE93C6
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14501 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:47 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0xE93E8
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14500 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:47 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0xE93D3
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14499 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:47 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		No
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0xE93E8
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{0631BBD8-6A81-A0A2-F1CB-363B0C7185B2}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51905
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14498 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		No
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0xE93D3
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{0631BBD8-6A81-A0A2-F1CB-363B0C7185B2}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51904
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14497 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		No
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0xE93C6
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{0631BBD8-6A81-A0A2-F1CB-363B0C7185B2}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51903
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14496 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		No
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0xE9379
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{0631BBD8-6A81-A0A2-F1CB-363B0C7185B2}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51901
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14495 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:47 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		No
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0xE8DDE
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{0631BBD8-6A81-A0A2-F1CB-363B0C7185B2}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51901
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14494 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0xE82B0
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14493 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:46 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		No
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-1105
	Account Name:		CHH2-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0xE82B0
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{0631BBD8-6A81-A0A2-F1CB-363B0C7185B2}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14492 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2049388200-1256274133-2677750962-3315280009
	Account Name:		7A272EA8-38D5-4AE1-B23C-9B9F89289BC5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xE81BF
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14491 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:46 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2049388200-1256274133-2677750962-3315280009
	Account Name:		7A272EA8-38D5-4AE1-B23C-9B9F89289BC5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xE81BF
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14490 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2049388200-1256274133-2677750962-3315280009
	Account Name:		7A272EA8-38D5-4AE1-B23C-9B9F89289BC5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xE81BF
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14489 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		7A272EA8-38D5-4AE1-B23C-9B9F89289BC5
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14488 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2049388200-1256274133-2677750962-3315280009
	Account Name:		7A272EA8-38D5-4AE1-B23C-9B9F89289BC5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xE80F2
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14487 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2049388200-1256274133-2677750962-3315280009
	Account Name:		7A272EA8-38D5-4AE1-B23C-9B9F89289BC5
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xE80F2
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14486 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		7A272EA8-38D5-4AE1-B23C-9B9F89289BC5
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14485 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0xE80CA
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14484 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0xE80CA
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14483 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0xE8033
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51912
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14482 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0xE8033
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14481 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0xE7FA0
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51912
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14480 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0xE7FA0
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14479 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0xE7F69
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51909
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14478 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0xE7F69
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14477 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0xE7F54
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51909
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14476 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0xE7F54
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14475 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0xE7F3D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51909
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14474 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0xE7F3D
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14473 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Identification
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0xE7F2C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51909
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14472 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0xE7F2C
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14471 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0xE7DA5
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{736F9FDF-8BD0-F911-EBB7-C517F44778D5}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51907
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14470 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0xE7DA5
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14469 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:46 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0xE7D4E
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14468 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:45 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0xE7D72
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14467 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:45 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0xE7D62
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14466 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:45 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0xE7D72
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{07A26218-EC88-882C-1A5C-3DFA8432F918}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51905
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14465 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0xE7D72
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14464 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0xE7D62
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{07A26218-EC88-882C-1A5C-3DFA8432F918}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51904
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14463 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0xE7D62
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14462 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0xE7D4E
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{07A26218-EC88-882C-1A5C-3DFA8432F918}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51903
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14461 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0xE7D4E
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14460 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0xE7D22
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{07A26218-EC88-882C-1A5C-3DFA8432F918}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	10.222.0.15
	Source Port:		51901
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14459 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0xE7D22
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14458 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:45 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-43984125-1166182081-2830458010-1640145388
	Account Name:		029F24FD-86C1-4582-9A5C-B5A8ECA1C261
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xDEAE7
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14457 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:44 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-43984125-1166182081-2830458010-1640145388
	Account Name:		029F24FD-86C1-4582-9A5C-B5A8ECA1C261
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xE2B26
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14456 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:37 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-43984125-1166182081-2830458010-1640145388
	Account Name:		029F24FD-86C1-4582-9A5C-B5A8ECA1C261
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xE2B26
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14455 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-43984125-1166182081-2830458010-1640145388
	Account Name:		029F24FD-86C1-4582-9A5C-B5A8ECA1C261
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xE2B26
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14454 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		029F24FD-86C1-4582-9A5C-B5A8ECA1C261
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14453 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:37 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-43984125-1166182081-2830458010-1640145388
	Account Name:		029F24FD-86C1-4582-9A5C-B5A8ECA1C261
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xDF813
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14452 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:30 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-43984125-1166182081-2830458010-1640145388
	Account Name:		029F24FD-86C1-4582-9A5C-B5A8ECA1C261
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xDF813
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14451 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:30 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-43984125-1166182081-2830458010-1640145388
	Account Name:		029F24FD-86C1-4582-9A5C-B5A8ECA1C261
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xDF813
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14450 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:30 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		029F24FD-86C1-4582-9A5C-B5A8ECA1C261
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14449 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:30 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-43984125-1166182081-2830458010-1640145388
	Account Name:		029F24FD-86C1-4582-9A5C-B5A8ECA1C261
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xDE998
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14448 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:30 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-43984125-1166182081-2830458010-1640145388
	Account Name:		029F24FD-86C1-4582-9A5C-B5A8ECA1C261
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xDEAE7
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14447 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:29 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-43984125-1166182081-2830458010-1640145388
	Account Name:		029F24FD-86C1-4582-9A5C-B5A8ECA1C261
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xDEAE7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14446 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:29 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		029F24FD-86C1-4582-9A5C-B5A8ECA1C261
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14445 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:29 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-43984125-1166182081-2830458010-1640145388
	Account Name:		029F24FD-86C1-4582-9A5C-B5A8ECA1C261
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xDEA8A
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14444 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:29 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-43984125-1166182081-2830458010-1640145388
	Account Name:		029F24FD-86C1-4582-9A5C-B5A8ECA1C261
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xDEA8A
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14443 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:29 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-43984125-1166182081-2830458010-1640145388
	Account Name:		029F24FD-86C1-4582-9A5C-B5A8ECA1C261
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xDEA8A
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14442 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:29 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		029F24FD-86C1-4582-9A5C-B5A8ECA1C261
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14441 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:29 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-43984125-1166182081-2830458010-1640145388
	Account Name:		029F24FD-86C1-4582-9A5C-B5A8ECA1C261
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xDEA3D
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14440 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:29 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-43984125-1166182081-2830458010-1640145388
	Account Name:		029F24FD-86C1-4582-9A5C-B5A8ECA1C261
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xDEA3D
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14439 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:29 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-43984125-1166182081-2830458010-1640145388
	Account Name:		029F24FD-86C1-4582-9A5C-B5A8ECA1C261
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xDEA3D
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14438 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:29 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		029F24FD-86C1-4582-9A5C-B5A8ECA1C261
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14437 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:29 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-43984125-1166182081-2830458010-1640145388
	Account Name:		029F24FD-86C1-4582-9A5C-B5A8ECA1C261
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xDE998
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14436 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:29 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-43984125-1166182081-2830458010-1640145388
	Account Name:		029F24FD-86C1-4582-9A5C-B5A8ECA1C261
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xDE998
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14435 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:29 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		029F24FD-86C1-4582-9A5C-B5A8ECA1C261
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14434 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:29 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2060743256-1305247782-4026088324-1666713087
	Account Name:		7AD47258-8026-4DCC-843B-F9EFFF055863
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xC746F
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14433 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:17 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-942598954-1340466096-901528491-1100605112
	Account Name:		382EEB2A-E3B0-4FE5-AB3B-BC35B8E69941
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xBD59B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14432 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:16 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2060743256-1305247782-4026088324-1666713087
	Account Name:		7AD47258-8026-4DCC-843B-F9EFFF055863
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xD05BC
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14431 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:12 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2060743256-1305247782-4026088324-1666713087
	Account Name:		7AD47258-8026-4DCC-843B-F9EFFF055863
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xD05BC
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14430 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2060743256-1305247782-4026088324-1666713087
	Account Name:		7AD47258-8026-4DCC-843B-F9EFFF055863
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xD05BC
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14429 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		7AD47258-8026-4DCC-843B-F9EFFF055863
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14428 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-942598954-1340466096-901528491-1100605112
	Account Name:		382EEB2A-E3B0-4FE5-AB3B-BC35B8E69941
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xCDBDB
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14427 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:10 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-942598954-1340466096-901528491-1100605112
	Account Name:		382EEB2A-E3B0-4FE5-AB3B-BC35B8E69941
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xCDBDB
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14426 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-942598954-1340466096-901528491-1100605112
	Account Name:		382EEB2A-E3B0-4FE5-AB3B-BC35B8E69941
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xCDBDB
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14425 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		382EEB2A-E3B0-4FE5-AB3B-BC35B8E69941
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14424 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:10 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2060743256-1305247782-4026088324-1666713087
	Account Name:		7AD47258-8026-4DCC-843B-F9EFFF055863
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xC81AB
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14423 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:05 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2060743256-1305247782-4026088324-1666713087
	Account Name:		7AD47258-8026-4DCC-843B-F9EFFF055863
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xC81AB
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14422 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2060743256-1305247782-4026088324-1666713087
	Account Name:		7AD47258-8026-4DCC-843B-F9EFFF055863
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xC81AB
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14421 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		7AD47258-8026-4DCC-843B-F9EFFF055863
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14420 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2060743256-1305247782-4026088324-1666713087
	Account Name:		7AD47258-8026-4DCC-843B-F9EFFF055863
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xC731B
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14419 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:05 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2060743256-1305247782-4026088324-1666713087
	Account Name:		7AD47258-8026-4DCC-843B-F9EFFF055863
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xC746F
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14418 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2060743256-1305247782-4026088324-1666713087
	Account Name:		7AD47258-8026-4DCC-843B-F9EFFF055863
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xC746F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14417 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		7AD47258-8026-4DCC-843B-F9EFFF055863
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14416 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2060743256-1305247782-4026088324-1666713087
	Account Name:		7AD47258-8026-4DCC-843B-F9EFFF055863
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xC7412
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14415 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2060743256-1305247782-4026088324-1666713087
	Account Name:		7AD47258-8026-4DCC-843B-F9EFFF055863
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xC7412
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14414 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2060743256-1305247782-4026088324-1666713087
	Account Name:		7AD47258-8026-4DCC-843B-F9EFFF055863
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xC7412
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14413 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		7AD47258-8026-4DCC-843B-F9EFFF055863
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14412 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-2060743256-1305247782-4026088324-1666713087
	Account Name:		7AD47258-8026-4DCC-843B-F9EFFF055863
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xC73C4
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14411 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:04 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2060743256-1305247782-4026088324-1666713087
	Account Name:		7AD47258-8026-4DCC-843B-F9EFFF055863
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xC73C4
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14410 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2060743256-1305247782-4026088324-1666713087
	Account Name:		7AD47258-8026-4DCC-843B-F9EFFF055863
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xC73C4
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14409 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		7AD47258-8026-4DCC-843B-F9EFFF055863
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14408 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-2060743256-1305247782-4026088324-1666713087
	Account Name:		7AD47258-8026-4DCC-843B-F9EFFF055863
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xC731B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14407 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-2060743256-1305247782-4026088324-1666713087
	Account Name:		7AD47258-8026-4DCC-843B-F9EFFF055863
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xC731B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14406 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		7AD47258-8026-4DCC-843B-F9EFFF055863
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14405 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14404 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14403 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-942598954-1340466096-901528491-1100605112
	Account Name:		382EEB2A-E3B0-4FE5-AB3B-BC35B8E69941
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xBFDA8
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14402 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:03 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-942598954-1340466096-901528491-1100605112
	Account Name:		382EEB2A-E3B0-4FE5-AB3B-BC35B8E69941
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xBFDA8
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14401 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-942598954-1340466096-901528491-1100605112
	Account Name:		382EEB2A-E3B0-4FE5-AB3B-BC35B8E69941
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xBFDA8
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14400 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		382EEB2A-E3B0-4FE5-AB3B-BC35B8E69941
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14399 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-942598954-1340466096-901528491-1100605112
	Account Name:		382EEB2A-E3B0-4FE5-AB3B-BC35B8E69941
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xBC9F3
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14398 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:02 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-942598954-1340466096-901528491-1100605112
	Account Name:		382EEB2A-E3B0-4FE5-AB3B-BC35B8E69941
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xBD59B
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14397 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-942598954-1340466096-901528491-1100605112
	Account Name:		382EEB2A-E3B0-4FE5-AB3B-BC35B8E69941
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xBD59B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14396 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		382EEB2A-E3B0-4FE5-AB3B-BC35B8E69941
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14395 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-942598954-1340466096-901528491-1100605112
	Account Name:		382EEB2A-E3B0-4FE5-AB3B-BC35B8E69941
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xBD3DF
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14394 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:02 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-942598954-1340466096-901528491-1100605112
	Account Name:		382EEB2A-E3B0-4FE5-AB3B-BC35B8E69941
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xBD3DF
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14393 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-942598954-1340466096-901528491-1100605112
	Account Name:		382EEB2A-E3B0-4FE5-AB3B-BC35B8E69941
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xBD3DF
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14392 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		382EEB2A-E3B0-4FE5-AB3B-BC35B8E69941
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14391 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-83-1-942598954-1340466096-901528491-1100605112
	Account Name:		382EEB2A-E3B0-4FE5-AB3B-BC35B8E69941
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xBD079
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14390 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:02 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-942598954-1340466096-901528491-1100605112
	Account Name:		382EEB2A-E3B0-4FE5-AB3B-BC35B8E69941
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xBD079
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14389 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-942598954-1340466096-901528491-1100605112
	Account Name:		382EEB2A-E3B0-4FE5-AB3B-BC35B8E69941
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xBD079
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14388 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		382EEB2A-E3B0-4FE5-AB3B-BC35B8E69941
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14387 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-83-1-942598954-1340466096-901528491-1100605112
	Account Name:		382EEB2A-E3B0-4FE5-AB3B-BC35B8E69941
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xBC9F3
Privileges:		SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14386 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-83-1-942598954-1340466096-901528491-1100605112
	Account Name:		382EEB2A-E3B0-4FE5-AB3B-BC35B8E69941
	Account Domain:		NT VIRTUAL MACHINE
	Logon ID:		0xBC9F3
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14385 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		382EEB2A-E3B0-4FE5-AB3B-BC35B8E69941
	Account Domain:		NT VIRTUAL MACHINE
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14384 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:02:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0x2A7DD
Group:
	Security ID:		S-1-5-32-544
	Group Name:		Administrators
	Group Domain:		Builtin
Process Information:
	Process ID:		0xaec
	Process Name:		C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14383 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:00:13 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Key migration operation.
Subject:
	Security ID:		S-1-5-19
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E5
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	ECDSA_P256
	Key Name:	Microsoft Connected Devices Platform device certificate
	Key Type:	User key.
Additional Information:
	Operation:	Export of persistent cryptographic key.
	Return Code:	0x0 | 5059 | 0 |  | 0 | 12292 | 0 | -9214364837600034816 | 14382 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:00:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other System Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Cryptographic operation.
Subject:
	Security ID:		S-1-5-19
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E5
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	ECDSA_P256
	Key Name:	Microsoft Connected Devices Platform device certificate
	Key Type:	User key.
Cryptographic Operation:
	Operation:	Open Key.
	Return Code:	0x0 | 5061 | 0 |  | 0 | 12290 | 0 | -9214364837600034816 | 14381 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:00:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | System Integrity | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Key file operation.
Subject:
	Security ID:		S-1-5-19
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E5
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	UNKNOWN
	Key Name:	Microsoft Connected Devices Platform device certificate
	Key Type:	User key.
Key File Operation Information:
	File Path:	C:\windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\de7cf8a7901d2ad13e5c67c29e5d1662_afd319b1-89fc-40d0-a8c3-fb9a30758cc0
	Operation:	Read persisted key from file.
	Return Code:	0x0 | 5058 | 0 |  | 0 | 12292 | 0 | -9214364837600034816 | 14380 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 9:00:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other System Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x14C38
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14379 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:59:06 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x6A8BB
Privileges:		SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14378 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x6A8BB
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{DFEBF5B4-A809-3CA9-B2C4-866D7FE2B9DB}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	CHH1-832929-1
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14377 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		administrator
	Account Domain:		CBCI-832929-1
	Logon GUID:		{DFEBF5B4-A809-3CA9-B2C4-866D7FE2B9DB}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14376 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:55 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-544
	Group Name:		Administrators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x5a0
	Process Name:		C:\Windows\System32\svchost.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14375 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:52 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x51E46
Privileges:		SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14374 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-500
	Account Name:		administrator
	Account Domain:		CBCI-832929-1
	Logon ID:		0x51E46
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{DF7CEED7-3F0F-A658-9056-129EA25FEFAF}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	CHH1-832929-1
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14373 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		administrator
	Account Domain:		CBCI-832929-1
	Logon GUID:		{DF7CEED7-3F0F-A658-9056-129EA25FEFAF}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14372 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:49 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x4C677
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14371 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:41 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x4C677
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{212E7C94-DEBA-3823-34C4-4C4E91AC8132}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14370 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x4C677
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14369 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon GUID:		{0BC7D3B8-7494-D6D1-2AFB-9A7DCEAA99B5}
Target Server:
	Target Server Name:	chh1-832929-1$
	Additional Information:	chh1-832929-1$
Process Information:
	Process ID:		0x1020
	Process Name:		C:\Windows\System32\taskhostw.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14368 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x4AB17
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14367 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:41 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x4AB17
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{864C0A12-1B2B-C5AA-D95C-F9E90A1EA40B}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	::1
	Source Port:		0
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14366 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x4AB17
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14365 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:41 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3ECF5
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14364 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:31 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x3ECF5
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{1267BAB4-13CD-2B7D-DA04-90F32981CD13}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14363 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:31 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3ECF5
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14362 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:31 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon GUID:		{5095299D-F930-4866-8D8F-1C620064C1E6}
Target Server:
	Target Server Name:	chh1-832929-1$
	Additional Information:	chh1-832929-1$
Process Information:
	Process ID:		0xfc8
	Process Name:		C:\Windows\System32\taskhostw.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14361 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:31 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3C844
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14360 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:31 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x3C844
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{864C0A12-1B2B-C5AA-D95C-F9E90A1EA40B}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	::1
	Source Port:		0
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14359 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:31 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3C844
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14358 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:31 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x2B392
Logon Type:			4
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14357 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 904 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:27 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| System security access was granted to an account.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0x2A7DD
Account Modified:
	Account Name:		S-1-5-21-341560813-2007793727-3810710785-500
Access Granted:
	Access Right:		SeServiceLogonRight | 4717 | 0 |  | 0 | 13569 | 0 | -9214364837600034816 | 14356 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 860 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:23 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Authentication Policy Change | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x337E3
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14355 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:18 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x337E3
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{F6D561B2-4656-3D4B-008D-C288E29366D4}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14354 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:18 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x337E3
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14353 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:18 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon GUID:		{887966DD-7C7F-BE57-0A9C-A26461320939}
Target Server:
	Target Server Name:	chh1-832929-1$
	Additional Information:	chh1-832929-1$
Process Information:
	Process ID:		0xc2c
	Process Name:		C:\Windows\System32\taskhostw.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14352 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:18 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14351 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:17 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14350 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:17 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x2B392
Privileges:		SeAssignPrimaryTokenPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14349 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x14C38
Logon Information:
	Logon Type:		4
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x2B392
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0xbdc
	Process Name:		C:\Program Files\Cloudbase Solutions\Cloudbase-Init\Python\python.exe
Network Information:
	Workstation Name:	CHH1-832929-1
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14348 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The computer attempted to validate the credentials for an account.
Authentication Package:	MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account:	cloudbase-init
Source Workstation:	CHH1-832929-1
Error Code:	0x0 | 4776 | 0 |  | 0 | 14336 | 0 | -9214364837600034816 | 14347 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:12 AM | ed1389aa-345c-0000-f089-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Credential Validation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An attempt was made to reset an account's password.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x14C38
Target Account:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1 | 4724 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14346 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A user account was changed.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x14C38
Target Account:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
Changed Attributes:
	SAM Account Name:	cloudbase-init
	Display Name:		cloudbase-init
	User Principal Name:	-
	Home Directory:		<value not set>
	Home Drive:		<value not set>
	Script Path:		<value not set>
	Profile Path:		<value not set>
	User Workstations:	<value not set>
	Password Last Set:	3/10/2022 8:58:12 AM
	Account Expires:		<never>
	Primary Group ID:	513
	AllowedToDelegateTo:	-
	Old UAC Value:		0x210
	New UAC Value:		0x210
	User Account Control:	-
	User Parameters:	-
	SID History:		-
	Logon Hours:		All
Additional Information:
	Privileges:		- | 4738 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14345 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A user's local group membership was enumerated.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x14C38
User:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
Process Information:
	Process ID:		0xbdc
	Process Name:		C:\Program Files\Cloudbase Solutions\Cloudbase-Init\Python\python.exe | 4798 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14344 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A user's local group membership was enumerated.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x14C38
User:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
Process Information:
	Process ID:		0xbdc
	Process Name:		C:\Program Files\Cloudbase Solutions\Cloudbase-Init\Python\python.exe | 4798 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14343 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:12 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-544
	Group Name:		Administrators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x5a0
	Process Name:		C:\Windows\System32\svchost.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14342 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:11 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0x2A7DD
Privileges:		SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14341 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:11 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-20
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E4
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0x2A7DD
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x454
	Process Name:		C:\Windows\System32\svchost.exe
Network Information:
	Workstation Name:	CHH1-832929-1
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14340 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:11 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-20
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E4
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x454
	Process Name:		C:\Windows\System32\svchost.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14339 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:11 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The computer attempted to validate the credentials for an account.
Authentication Package:	MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account:	Admin
Source Workstation:	CHH1-832929-1
Error Code:	0x0 | 4776 | 0 |  | 0 | 14336 | 0 | -9214364837600034816 | 14338 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:11 AM | ed1389aa-345c-0001-f489-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Credential Validation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Cryptographic operation.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	RSA
	Key Name:	2918b4e7-76e8-40a6-811b-dfe4e3ba9c02
	Key Type:	Machine key.
Cryptographic Operation:
	Operation:	Open Key.
	Return Code:	0x0 | 5061 | 0 |  | 0 | 12290 | 0 | -9214364837600034816 | 14337 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:11 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | System Integrity | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Key file operation.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	UNKNOWN
	Key Name:	2918b4e7-76e8-40a6-811b-dfe4e3ba9c02
	Key Type:	Machine key.
Key File Operation Information:
	File Path:	C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\5cf5daefd59ffe267deaaa220897ebe2_afd319b1-89fc-40d0-a8c3-fb9a30758cc0
	Operation:	Read persisted key from file.
	Return Code:	0x0 | 5058 | 0 |  | 0 | 12292 | 0 | -9214364837600034816 | 14336 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:11 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other System Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2530F
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14335 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:08 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x2530F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{864C0A12-1B2B-C5AA-D95C-F9E90A1EA40B}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	::1
	Source Port:		0
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14334 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x2530F
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14333 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-551
	Group Name:		Backup Operators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14332 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-544
	Group Name:		Administrators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x9cc
	Process Name:		C:\Windows\System32\vmms.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14331 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:08 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14330 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14329 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14328 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14327 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Domain Policy was changed.
Change Type:		Password Policy modified
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Domain:
	Domain Name:		CHH1-832929-1
	Domain ID:		S-1-5-21-2302723854-295832418-3023792030
Changed Attributes:
	Min. Password Age:	
	Max. Password Age:	
	Force Logoff:		
	Lockout Threshold:	
	Lockout Observation Window:	
	Lockout Duration:	
	Password Properties:	
	Min. Password Length:	
	Password History Length:	-
	Machine Account Quota:	-
	Mixed Domain Mode:	-
	Domain Behavior Version:	-
	OEM Information:	1
Additional Information:
	Privileges:		- | 4739 | 0 |  | 0 | 13569 | 0 | -9214364837600034816 | 14326 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:07 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Authentication Policy Change | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1C9F6
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14325 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:05 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1C9F6
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{864C0A12-1B2B-C5AA-D95C-F9E90A1EA40B}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	::1
	Source Port:		0
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14324 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1C9F6
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14323 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1B986
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14322 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 860 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:05 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1.LOCAL
	Logon ID:		0x1B986
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{864C0A12-1B2B-C5AA-D95C-F9E90A1EA40B}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	::1
	Source Port:		0
Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14321 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x1B986
Privileges:		SeSecurityPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeTakeOwnershipPrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeLoadDriverPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14320 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The Windows Firewall service started successfully. | 5024 | 0 |  | 0 | 12292 | 0 | -9214364837600034816 | 14319 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:05 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other System Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Cryptographic operation.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	RSA
	Key Name:	TSSecKeySet1
	Key Type:	Machine key.
Cryptographic Operation:
	Operation:	Open Key.
	Return Code:	0x0 | 5061 | 0 |  | 0 | 12290 | 0 | -9214364837600034816 | 14318 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | System Integrity | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Key file operation.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	UNKNOWN
	Key Name:	TSSecKeySet1
	Key Type:	Machine key.
Key File Operation Information:
	File Path:	C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\f686aace6942fb7f7ceb231212eef4a4_afd319b1-89fc-40d0-a8c3-fb9a30758cc0
	Operation:	Read persisted key from file.
	Return Code:	0x0 | 5058 | 0 |  | 0 | 12292 | 0 | -9214364837600034816 | 14317 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other System Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Cryptographic operation.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	RSA
	Key Name:	TSSecKeySet1
	Key Type:	Machine key.
Cryptographic Operation:
	Operation:	Open Key.
	Return Code:	0x0 | 5061 | 0 |  | 0 | 12290 | 0 | -9214364837600034816 | 14316 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 868 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | System Integrity | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Key file operation.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	UNKNOWN
	Key Name:	TSSecKeySet1
	Key Type:	Machine key.
Key File Operation Information:
	File Path:	C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\f686aace6942fb7f7ceb231212eef4a4_afd319b1-89fc-40d0-a8c3-fb9a30758cc0
	Operation:	Read persisted key from file.
	Return Code:	0x0 | 5058 | 0 |  | 0 | 12292 | 0 | -9214364837600034816 | 14315 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other System Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-544
	Group Name:		Administrators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x5a0
	Process Name:		C:\Windows\System32\svchost.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14314 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 860 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		No
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-7
	Account Name:		ANONYMOUS LOGON
	Account Domain:		NT AUTHORITY
	Logon ID:		0x15DA0
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		NtLmSsp 
	Authentication Package:	NTLM
	Transited Services:	-
	Package Name (NTLM only):	NTLM V1
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14313 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14312 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14311 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14310 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2140 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14309 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2140 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14308 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2140 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14307 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2140 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14306 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14305 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x14C38
Privileges:		SeAssignPrimaryTokenPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14304 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x14C38
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	CHH1-832929-1
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14303 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14302 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The computer attempted to validate the credentials for an account.
Authentication Package:	MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account:	cloudbase-init
Source Workstation:	CHH1-832929-1
Error Code:	0x0 | 4776 | 0 |  | 0 | 14336 | 0 | -9214364837600034816 | 14301 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:04 AM | ed1389aa-345c-0005-c789-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Credential Validation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-20
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E4
Group:
	Security ID:		S-1-5-32-551
	Group Name:		Backup Operators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x454
	Process Name:		C:\Windows\System32\svchost.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14300 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2136 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-20
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E4
Group:
	Security ID:		S-1-5-32-544
	Group Name:		Administrators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x454
	Process Name:		C:\Windows\System32\svchost.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14299 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2136 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14298 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14297 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2128 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:04 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14296 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2140 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14295 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 2140 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-551
	Group Name:		Backup Operators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x5a0
	Process Name:		C:\Windows\System32\svchost.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14294 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-544
	Group Name:		Administrators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x5a0
	Process Name:		C:\Windows\System32\svchost.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14293 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The Windows Firewall Driver started successfully. | 5033 | 0 |  | 0 | 12292 | 0 | -9214364837600034816 | 14292 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 32 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:03 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other System Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-551
	Group Name:		Backup Operators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x604
	Process Name:		C:\Windows\System32\VSSVC.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14291 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-544
	Group Name:		Administrators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x604
	Process Name:		C:\Windows\System32\VSSVC.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14290 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-551
	Group Name:		Backup Operators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x604
	Process Name:		C:\Windows\System32\VSSVC.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14289 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-544
	Group Name:		Administrators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x604
	Process Name:		C:\Windows\System32\VSSVC.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14288 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-551
	Group Name:		Backup Operators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x604
	Process Name:		C:\Windows\System32\VSSVC.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14287 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-544
	Group Name:		Administrators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x604
	Process Name:		C:\Windows\System32\VSSVC.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14286 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14285 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 860 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14284 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 860 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-551
	Group Name:		Backup Operators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x604
	Process Name:		C:\Windows\System32\VSSVC.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14283 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 860 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-544
	Group Name:		Administrators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x604
	Process Name:		C:\Windows\System32\VSSVC.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14282 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 860 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14281 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 860 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14280 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 860 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14279 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 860 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14278 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 860 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:03 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The system time was changed.
Subject:
	Security ID:		S-1-5-19
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E5
Process Information:
	Process ID:	0x3f0
	Name:		C:\Windows\System32\svchost.exe
Previous Time:		?2022?-?03?-?10T08:58:02.478924500Z
New Time:		?2022?-?03?-?10T08:58:02.967000000Z
This event is generated when the system time is changed. It is normal for the Windows Time Service, which runs with System privilege, to change the system time on a regular basis. Other system time changes may be indicative of attempts to tamper with the computer. | 4616 | 1 |  | 0 | 12288 | 0 | -9214364837600034816 | 14277 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 184 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:02 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security State Change | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14276 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 860 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14275 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 860 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14274 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14273 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 912 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-19
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E5
Privileges:		SeAssignPrimaryTokenPrivilege
			SeAuditPrivilege
			SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14272 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-19
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E5
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14271 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-90-0-1
	Account Name:		DWM-1
	Account Domain:		Window Manager
	Logon ID:		0xBEC3
Privileges:		SeAssignPrimaryTokenPrivilege
			SeAuditPrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14270 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-90-0-1
	Account Name:		DWM-1
	Account Domain:		Window Manager
	Logon ID:		0xBE99
Privileges:		SeAssignPrimaryTokenPrivilege
			SeAuditPrivilege
			SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14269 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		2
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		No
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-90-0-1
	Account Name:		DWM-1
	Account Domain:		Window Manager
	Logon ID:		0xBEC3
	Linked Logon ID:		0xBE99
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x2e0
	Process Name:		C:\Windows\System32\winlogon.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14268 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		2
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-90-0-1
	Account Name:		DWM-1
	Account Domain:		Window Manager
	Logon ID:		0xBE99
	Linked Logon ID:		0xBEC3
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x2e0
	Process Name:		C:\Windows\System32\winlogon.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14267 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DWM-1
	Account Domain:		Window Manager
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x2e0
	Process Name:		C:\Windows\System32\winlogon.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14266 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:02 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-20
	Account Name:		NETWORK SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E4
Privileges:		SeAssignPrimaryTokenPrivilege
			SeAuditPrivilege
			SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14265 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-20
	Account Name:		NETWORK SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E4
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14264 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14263 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 860 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		CBCI-832929-1
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14262 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 860 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:01 AM | ed1389aa-345c-0005-ad89-13ed5c34d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The Per-user audit policy table was created.
Number of Elements:	0
Policy ID:	0x6518 | 4902 | 0 |  | 0 | 13568 | 0 | -9214364837600034816 | 14261 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 876 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:58:00 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Audit Policy Change | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		0
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		-
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x4
	Process Name:		
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		-
	Authentication Package:	-
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14260 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 832 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:57:59 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Windows is starting up.
This event is logged when LSASS.EXE starts and the auditing subsystem is initialized. | 4608 | 0 |  | 0 | 12288 | 0 | -9214364837600034816 | 14259 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 832 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:57:59 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security State Change | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x33c
	New Process Name:	C:\Windows\System32\lsass.exe
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x2b8
	Creator Process Name:	C:\Windows\System32\wininit.exe
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 14258 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 224 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:57:59 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x32c
	New Process Name:	C:\Windows\System32\services.exe
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x2b8
	Creator Process Name:	C:\Windows\System32\wininit.exe
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 14257 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 184 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:57:59 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x2e0
	New Process Name:	C:\Windows\System32\winlogon.exe
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x29c
	Creator Process Name:	C:\Windows\System32\smss.exe
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 14256 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 184 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:57:58 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x2b8
	New Process Name:	C:\Windows\System32\wininit.exe
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x244
	Creator Process Name:	C:\Windows\System32\smss.exe
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 14255 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 184 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:57:58 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x2a4
	New Process Name:	C:\Windows\System32\csrss.exe
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x29c
	Creator Process Name:	C:\Windows\System32\smss.exe
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 14254 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 184 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:57:58 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x29c
	New Process Name:	C:\Windows\System32\smss.exe
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x18c
	Creator Process Name:	C:\Windows\System32\smss.exe
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 14253 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 184 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:57:58 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x250
	New Process Name:	C:\Windows\System32\csrss.exe
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x244
	Creator Process Name:	C:\Windows\System32\smss.exe
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 14252 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 184 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:57:57 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x244
	New Process Name:	C:\Windows\System32\smss.exe
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x18c
	Creator Process Name:	C:\Windows\System32\smss.exe
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 14251 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 184 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:57:57 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x218
	New Process Name:	C:\Windows\System32\autochk.exe
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x18c
	Creator Process Name:	C:\Windows\System32\smss.exe
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 14250 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 224 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:57:55 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x18c
	New Process Name:	C:\Windows\System32\smss.exe
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x4
	Creator Process Name:	
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 14249 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 136 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:57:54 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x188
	New Process Name:	
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x4
	Creator Process Name:	
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 14248 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 136 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:57:54 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Boot Configuration Data loaded.
Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
General Settings:
	Load Options:		-
	Advanced Options:		No
	Configuration Access Policy:	Default
	System Event Logging:	No
	Kernel Debugging:	No
	VSM Launch Type:	Auto
Signature Settings:
	Test Signing:		No
	Flight Signing:		No
	Disable Integrity Checks:	No
HyperVisor Settings:
	HyperVisor Load Options:	-
	HyperVisor Launch Type:	Auto
	HyperVisor Debugging:	No | 4826 | 0 |  | 0 | 13573 | 0 | -9214364837600034816 | 14247 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 136 | chh1-832929-1.cbci-832929-1.local |  | 3/10/2022 8:57:54 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other Policy Change Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The system time was changed.
Subject:
	Security ID:		S-1-5-19
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E5
Process Information:
	Process ID:	0x594
	Name:		C:\Windows\System32\svchost.exe
Previous Time:		?2022?-?03?-?10T08:57:43.744240700Z
New Time:		?2022?-?03?-?10T08:57:43.736000000Z
This event is generated when the system time is changed. It is normal for the Windows Time Service, which runs with System privilege, to change the system time on a regular basis. Other system time changes may be indicative of attempts to tamper with the computer. | 4616 | 1 |  | 0 | 12288 | 0 | -9214364837600034816 | 14246 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 512 | chh1-832929-1 |  | 3/10/2022 8:57:43 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security State Change | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0x6800A0
Privileges:		SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14245 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 1020 | chh1-832929-1 |  | 3/10/2022 8:57:43 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-20
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E4
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0x6800A0
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x530
	Process Name:		C:\Windows\System32\svchost.exe
Network Information:
	Workstation Name:	CHH1-832929-1
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14244 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 1020 | chh1-832929-1 |  | 3/10/2022 8:57:43 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-20
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E4
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x530
	Process Name:		C:\Windows\System32\svchost.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14243 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 1020 | chh1-832929-1 |  | 3/10/2022 8:57:43 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The computer attempted to validate the credentials for an account.
Authentication Package:	MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account:	Admin
Source Workstation:	CHH1-832929-1
Error Code:	0x0 | 4776 | 0 |  | 0 | 14336 | 0 | -9214364837600034816 | 14242 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 1020 | chh1-832929-1 |  | 3/10/2022 8:57:43 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Credential Validation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The event logging service has shut down. | 1100 | 0 |  | 4 | 103 | 0 | 4620693217682128896 | 14241 | Microsoft-Windows-Eventlog | fc65ddd8-d6ef-4962-83d5-6e5cfe9ce148 | Security | 1420 | 1516 | chh1-832929-1 |  | 3/10/2022 8:57:43 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Service shutdown | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A member was added to a security-enabled local group.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0x158B0C
Member:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-513
	Account Name:		-
Group:
	Security ID:		S-1-5-32-545
	Group Name:		Users
	Group Domain:		Builtin
Additional Information:
	Privileges:		- | 4732 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14240 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 856 | chh1-832929-1 |  | 3/10/2022 8:57:39 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A member was added to a security-enabled local group.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0x158B0C
Member:
	Security ID:		S-1-5-21-341560813-2007793727-3810710785-512
	Account Name:		-
Group:
	Security ID:		S-1-5-32-544
	Group Name:		Administrators
	Group Domain:		Builtin
Additional Information:
	Privileges:		- | 4732 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14239 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 856 | chh1-832929-1 |  | 3/10/2022 8:57:39 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0x158B0C
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	chad-832929-1.cbci-832929-1.local
	Additional Information:	cifs/chad-832929-1.cbci-832929-1.local
Process Information:
	Process ID:		0x4
	Process Name:		
Network Information:
	Network Address:	10.222.0.26
	Port:			445
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14238 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 856 | chh1-832929-1 |  | 3/10/2022 8:57:39 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0x158B0C
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	chad-832929-1.cbci-832929-1.local
	Additional Information:	cifs/chad-832929-1.cbci-832929-1.local
Process Information:
	Process ID:		0x4
	Process Name:		
Network Information:
	Network Address:	10.222.0.26
	Port:			445
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14237 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 1020 | chh1-832929-1 |  | 3/10/2022 8:57:39 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0x158B0C
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	chad-832929-1.cbci-832929-1.local
	Additional Information:	cifs/chad-832929-1.cbci-832929-1.local
Process Information:
	Process ID:		0x4
	Process Name:		
Network Information:
	Network Address:	10.222.0.26
	Port:			445
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14236 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 1020 | chh1-832929-1 |  | 3/10/2022 8:57:39 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0x158B0C
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	chad-832929-1.cbci-832929-1.local
	Additional Information:	cifs/chad-832929-1.cbci-832929-1.local
Process Information:
	Process ID:		0x4
	Process Name:		
Network Information:
	Network Address:	10.222.0.26
	Port:			445
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14235 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 3884 | chh1-832929-1 |  | 3/10/2022 8:57:39 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0x158B0C
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	chad-832929-1.cbci-832929-1.local
	Additional Information:	cifs/chad-832929-1.cbci-832929-1.local
Process Information:
	Process ID:		0x4
	Process Name:		
Network Information:
	Network Address:	10.222.0.26
	Port:			445
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14234 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 3884 | chh1-832929-1 |  | 3/10/2022 8:57:39 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0x158B0C
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	chad-832929-1.cbci-832929-1.local
	Additional Information:	cifs/chad-832929-1.cbci-832929-1.local
Process Information:
	Process ID:		0x4
	Process Name:		
Network Information:
	Network Address:	10.222.0.26
	Port:			445
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14233 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 856 | chh1-832929-1 |  | 3/10/2022 8:57:39 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0x158B0C
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	chad-832929-1.cbci-832929-1.local
	Additional Information:	cifs/chad-832929-1.cbci-832929-1.local
Process Information:
	Process ID:		0x4
	Process Name:		
Network Information:
	Network Address:	10.222.0.26
	Port:			445
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14232 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 4960 | chh1-832929-1 |  | 3/10/2022 8:57:39 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0x158B0C
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	chad-832929-1.cbci-832929-1.local
	Additional Information:	LDAP/chad-832929-1.cbci-832929-1.local
Process Information:
	Process ID:		0x530
	Process Name:		C:\Windows\System32\svchost.exe
Network Information:
	Network Address:	10.222.0.26
	Port:			49666
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14231 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 856 | chh1-832929-1 |  | 3/10/2022 8:57:38 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0x158B0C
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon GUID:		{EC9B81CC-A7BA-9E6C-F875-A8219F6794C9}
Target Server:
	Target Server Name:	chad-832929-1.cbci-832929-1.local
	Additional Information:	ldap/chad-832929-1.cbci-832929-1.local
Process Information:
	Process ID:		0x530
	Process Name:		C:\Windows\System32\svchost.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14230 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 856 | chh1-832929-1 |  | 3/10/2022 8:57:38 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0x158B0C
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		Administrator
	Account Domain:		CBCI-832929-1.LOCAL
	Logon GUID:		{EC9B81CC-A7BA-9E6C-F875-A8219F6794C9}
Target Server:
	Target Server Name:	chad-832929-1.cbci-832929-1.local
	Additional Information:	cifs/chad-832929-1.cbci-832929-1.local
Process Information:
	Process ID:		0x4
	Process Name:		
Network Information:
	Network Address:	10.222.0.26
	Port:			445
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14229 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 856 | chh1-832929-1 |  | 3/10/2022 8:57:38 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0x158B0C
Group:
	Security ID:		S-1-5-32-544
	Group Name:		Administrators
	Group Domain:		Builtin
Process Information:
	Process ID:		0xef8
	Process Name:		C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14228 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 856 | chh1-832929-1 |  | 3/10/2022 8:57:22 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14227 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:30:29 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x320
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14226 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:30:29 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14225 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:10:45 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x320
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14224 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:10:45 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A user's local group membership was enumerated.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0x158B0C
User:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
Process Information:
	Process ID:		0xc4c
	Process Name:		C:\Program Files\Git\usr\bin\bash.exe | 4798 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14223 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 856 | chh1-832929-1 |  | 3/10/2022 8:10:37 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0x158B0C
Privileges:		SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14222 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 896 | chh1-832929-1 |  | 3/10/2022 8:07:53 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-20
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E4
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0x158B0C
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x530
	Process Name:		C:\Windows\System32\svchost.exe
Network Information:
	Workstation Name:	CHH1-832929-1
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14221 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 896 | chh1-832929-1 |  | 3/10/2022 8:07:53 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-20
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E4
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x530
	Process Name:		C:\Windows\System32\svchost.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14220 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 896 | chh1-832929-1 |  | 3/10/2022 8:07:53 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The computer attempted to validate the credentials for an account.
Authentication Package:	MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account:	Admin
Source Workstation:	CHH1-832929-1
Error Code:	0x0 | 4776 | 0 |  | 0 | 14336 | 0 | -9214364837600034816 | 14219 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 896 | chh1-832929-1 |  | 3/10/2022 8:07:53 AM | 3fe8e847-3455-0003-97eb-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Credential Validation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0x147070
Privileges:		SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14218 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:07:46 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-20
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E4
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0x147070
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x530
	Process Name:		C:\Windows\System32\svchost.exe
Network Information:
	Workstation Name:	CHH1-832929-1
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14217 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:07:46 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-20
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E4
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x530
	Process Name:		C:\Windows\System32\svchost.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14216 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:07:46 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The computer attempted to validate the credentials for an account.
Authentication Package:	MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account:	Admin
Source Workstation:	CHH1-832929-1
Error Code:	0x0 | 4776 | 0 |  | 0 | 14336 | 0 | -9214364837600034816 | 14215 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:07:46 AM | 3fe8e847-3455-0005-67eb-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Credential Validation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0x144F6A
Privileges:		SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14214 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 856 | chh1-832929-1 |  | 3/10/2022 8:07:46 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-20
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E4
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0x144F6A
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x530
	Process Name:		C:\Windows\System32\svchost.exe
Network Information:
	Workstation Name:	CHH1-832929-1
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14213 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 856 | chh1-832929-1 |  | 3/10/2022 8:07:46 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-20
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E4
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x530
	Process Name:		C:\Windows\System32\svchost.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14212 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 856 | chh1-832929-1 |  | 3/10/2022 8:07:46 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The computer attempted to validate the credentials for an account.
Authentication Package:	MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account:	Admin
Source Workstation:	CHH1-832929-1
Error Code:	0x0 | 4776 | 0 |  | 0 | 14336 | 0 | -9214364837600034816 | 14211 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 856 | chh1-832929-1 |  | 3/10/2022 8:07:46 AM | 3fe8e847-3455-0005-61eb-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Credential Validation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0x142DA6
Privileges:		SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14210 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 856 | chh1-832929-1 |  | 3/10/2022 8:07:44 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-20
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E4
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0x142DA6
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x530
	Process Name:		C:\Windows\System32\svchost.exe
Network Information:
	Workstation Name:	CHH1-832929-1
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14209 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 856 | chh1-832929-1 |  | 3/10/2022 8:07:44 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-20
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E4
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x530
	Process Name:		C:\Windows\System32\svchost.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14208 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 856 | chh1-832929-1 |  | 3/10/2022 8:07:44 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The computer attempted to validate the credentials for an account.
Authentication Package:	MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account:	Admin
Source Workstation:	CHH1-832929-1
Error Code:	0x0 | 4776 | 0 |  | 0 | 14336 | 0 | -9214364837600034816 | 14207 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 856 | chh1-832929-1 |  | 3/10/2022 8:07:44 AM | 3fe8e847-3455-0005-5feb-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Credential Validation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An attempt was made to reset an account's password.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0xBBC3B
Target Account:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-500
	Account Name:		Administrator
	Account Domain:		CHH1-832929-1 | 4724 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14206 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:07:04 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A user account was changed.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0xBBC3B
Target Account:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-500
	Account Name:		Administrator
	Account Domain:		CHH1-832929-1
Changed Attributes:
	SAM Account Name:	Administrator
	Display Name:		<value not set>
	User Principal Name:	-
	Home Directory:		<value not set>
	Home Drive:		<value not set>
	Script Path:		<value not set>
	Profile Path:		<value not set>
	User Workstations:	<value not set>
	Password Last Set:	3/10/2022 8:07:04 AM
	Account Expires:		<never>
	Primary Group ID:	513
	AllowedToDelegateTo:	-
	Old UAC Value:		0x10
	New UAC Value:		0x10
	User Account Control:	-
	User Parameters:	-
	SID History:		-
	Logon Hours:		All
Additional Information:
	Privileges:		- | 4738 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14205 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:07:04 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A user's local group membership was enumerated.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0xBBC3B
User:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-500
	Account Name:		Administrator
	Account Domain:		CHH1-832929-1
Process Information:
	Process ID:		0x990
	Process Name:		C:\Windows\System32\net1.exe | 4798 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14204 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:07:04 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0xBBC3B
Group:
	Security ID:		S-1-5-32-544
	Group Name:		Administrators
	Group Domain:		Builtin
Process Information:
	Process ID:		0xc84
	Process Name:		C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14203 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:06:53 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Cryptographic operation.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	RSA
	Key Name:	d333d640-a50f-7cdf-7d80-d8d5ae7a9b11
	Key Type:	User key.
Cryptographic Operation:
	Operation:	Open Key.
	Return Code:	0x0 | 5061 | 0 |  | 0 | 12290 | 0 | -9214364837600034816 | 14202 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:06:43 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | System Integrity | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Key file operation.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	UNKNOWN
	Key Name:	d333d640-a50f-7cdf-7d80-d8d5ae7a9b11
	Key Type:	User key.
Key File Operation Information:
	File Path:	C:\ProgramData\Microsoft\Crypto\SystemKeys\63819b95e4646e20a43fc837afb825c9_6f209d63-1e80-4632-84d6-2afc9405ddcc
	Operation:	Read persisted key from file.
	Return Code:	0x0 | 5058 | 0 |  | 0 | 12292 | 0 | -9214364837600034816 | 14201 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:06:43 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other System Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Key migration operation.
Subject:
	Security ID:		S-1-5-19
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E5
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	ECDSA_P256
	Key Name:	Microsoft Connected Devices Platform device certificate
	Key Type:	User key.
Additional Information:
	Operation:	Export of persistent cryptographic key.
	Return Code:	0x0 | 5059 | 0 |  | 0 | 12292 | 0 | -9214364837600034816 | 14200 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:05:20 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other System Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Key migration operation.
Subject:
	Security ID:		S-1-5-19
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E5
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	ECDSA_P256
	Key Name:	Microsoft Connected Devices Platform device certificate
	Key Type:	User key.
Additional Information:
	Operation:	Export of persistent cryptographic key.
	Return Code:	0x0 | 5059 | 0 |  | 0 | 12292 | 0 | -9214364837600034816 | 14199 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:05:20 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other System Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Key migration operation.
Subject:
	Security ID:		S-1-5-19
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E5
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	ECDSA_P256
	Key Name:	Microsoft Connected Devices Platform device certificate
	Key Type:	User key.
Additional Information:
	Operation:	Export of persistent cryptographic key.
	Return Code:	0x0 | 5059 | 0 |  | 0 | 12292 | 0 | -9214364837600034816 | 14198 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:05:20 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other System Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Cryptographic operation.
Subject:
	Security ID:		S-1-5-19
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E5
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	ECDSA_P256
	Key Name:	Microsoft Connected Devices Platform device certificate
	Key Type:	User key.
Cryptographic Operation:
	Operation:	Open Key.
	Return Code:	0x0 | 5061 | 0 |  | 0 | 12290 | 0 | -9214364837600034816 | 14197 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:05:20 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | System Integrity | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Key file operation.
Subject:
	Security ID:		S-1-5-19
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E5
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	UNKNOWN
	Key Name:	Microsoft Connected Devices Platform device certificate
	Key Type:	User key.
Key File Operation Information:
	File Path:	C:\windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\de7cf8a7901d2ad13e5c67c29e5d1662_afd319b1-89fc-40d0-a8c3-fb9a30758cc0
	Operation:	Read persisted key from file.
	Return Code:	0x0 | 5058 | 0 |  | 0 | 12292 | 0 | -9214364837600034816 | 14196 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:05:20 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other System Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Cryptographic operation.
Subject:
	Security ID:		S-1-5-19
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E5
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	ECDSA_P256
	Key Name:	Microsoft Connected Devices Platform device certificate
	Key Type:	User key.
Cryptographic Operation:
	Operation:	Create Key.
	Return Code:	0x0 | 5061 | 0 |  | 0 | 12290 | 0 | -9214364837600034816 | 14195 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:05:20 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | System Integrity | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Key file operation.
Subject:
	Security ID:		S-1-5-19
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E5
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	ECDSA_P256
	Key Name:	Microsoft Connected Devices Platform device certificate
	Key Type:	User key.
Key File Operation Information:
	File Path:	C:\windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\de7cf8a7901d2ad13e5c67c29e5d1662_afd319b1-89fc-40d0-a8c3-fb9a30758cc0
	Operation:	Write persisted key to file.
	Return Code:	0x0 | 5058 | 0 |  | 0 | 12292 | 0 | -9214364837600034816 | 14194 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:05:20 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other System Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Cryptographic operation.
Subject:
	Security ID:		S-1-5-19
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E5
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	UNKNOWN
	Key Name:	Microsoft Connected Devices Platform device certificate
	Key Type:	User key.
Cryptographic Operation:
	Operation:	Open Key.
	Return Code:	0x80090016 | 5061 | 0 |  | 0 | 12290 | 0 | -9218868437227405312 | 14193 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:05:20 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | System Integrity | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Key file operation.
Subject:
	Security ID:		S-1-5-19
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E5
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	ECDSA_P256
	Key Name:	Microsoft Connected Devices Platform device certificate
	Key Type:	User key.
Key File Operation Information:
	File Path:	C:\windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\de7cf8a7901d2ad13e5c67c29e5d1662_6f209d63-1e80-4632-84d6-2afc9405ddcc
	Operation:	Delete key file.
	Return Code:	0x0 | 5058 | 0 |  | 0 | 12292 | 0 | -9214364837600034816 | 14192 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:05:20 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other System Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Cryptographic operation.
Subject:
	Security ID:		S-1-5-19
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E5
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	ECDSA_P256
	Key Name:	Microsoft Connected Devices Platform device certificate
	Key Type:	User key.
Cryptographic Operation:
	Operation:	Open Key.
	Return Code:	0x0 | 5061 | 0 |  | 0 | 12290 | 0 | -9214364837600034816 | 14191 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:05:20 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | System Integrity | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Key file operation.
Subject:
	Security ID:		S-1-5-19
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E5
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	UNKNOWN
	Key Name:	Microsoft Connected Devices Platform device certificate
	Key Type:	User key.
Key File Operation Information:
	File Path:	C:\windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\de7cf8a7901d2ad13e5c67c29e5d1662_6f209d63-1e80-4632-84d6-2afc9405ddcc
	Operation:	Read persisted key from file.
	Return Code:	0x0 | 5058 | 0 |  | 0 | 12292 | 0 | -9214364837600034816 | 14190 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:05:20 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other System Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Key migration operation.
Subject:
	Security ID:		S-1-5-19
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E5
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	ECDSA_P256
	Key Name:	Microsoft Connected Devices Platform device certificate
	Key Type:	User key.
Additional Information:
	Operation:	Export of persistent cryptographic key.
	Return Code:	0x0 | 5059 | 0 |  | 0 | 12292 | 0 | -9214364837600034816 | 14189 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:05:20 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other System Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Cryptographic operation.
Subject:
	Security ID:		S-1-5-19
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E5
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	ECDSA_P256
	Key Name:	Microsoft Connected Devices Platform device certificate
	Key Type:	User key.
Cryptographic Operation:
	Operation:	Open Key.
	Return Code:	0x0 | 5061 | 0 |  | 0 | 12290 | 0 | -9214364837600034816 | 14188 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:05:20 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | System Integrity | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Key file operation.
Subject:
	Security ID:		S-1-5-19
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E5
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	UNKNOWN
	Key Name:	Microsoft Connected Devices Platform device certificate
	Key Type:	User key.
Key File Operation Information:
	File Path:	C:\windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\de7cf8a7901d2ad13e5c67c29e5d1662_6f209d63-1e80-4632-84d6-2afc9405ddcc
	Operation:	Read persisted key from file.
	Return Code:	0x0 | 5058 | 0 |  | 0 | 12292 | 0 | -9214364837600034816 | 14187 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:05:20 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other System Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x2AF11
Logon Type:			5
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14186 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:04:21 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The system time was changed.
Subject:
	Security ID:		S-1-5-19
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E5
Process Information:
	Process ID:	0x594
	Name:		C:\Windows\System32\svchost.exe
Previous Time:		?2022?-?03?-?10T08:04:20.259466400Z
New Time:		?2022?-?03?-?10T08:04:20.258000000Z
This event is generated when the system time is changed. It is normal for the Windows Time Service, which runs with System privilege, to change the system time on a regular basis. Other system time changes may be indicative of attempts to tamper with the computer. | 4616 | 1 |  | 0 | 12288 | 0 | -9214364837600034816 | 14185 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 512 | chh1-832929-1 |  | 3/10/2022 8:04:20 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security State Change | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0xBBC3B
Privileges:		SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14184 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:04:18 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-20
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E4
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0xBBC3B
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x530
	Process Name:		C:\Windows\System32\svchost.exe
Network Information:
	Workstation Name:	CHH1-832929-1
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14183 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:04:18 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-20
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E4
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x530
	Process Name:		C:\Windows\System32\svchost.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14182 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:04:18 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The computer attempted to validate the credentials for an account.
Authentication Package:	MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account:	Admin
Source Workstation:	CHH1-832929-1
Error Code:	0x0 | 4776 | 0 |  | 0 | 14336 | 0 | -9214364837600034816 | 14181 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:04:18 AM | 3fe8e847-3455-0001-18e9-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Credential Validation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0xABA25
Logon Type:			3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14180 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:04:09 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0xABA25
Privileges:		SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14179 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:04:09 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x5353F
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0xABA25
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x530
	Process Name:		C:\Windows\System32\svchost.exe
Network Information:
	Workstation Name:	CHH1-832929-1
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14178 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:04:09 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x5353F
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x530
	Process Name:		C:\Windows\System32\svchost.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14177 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:04:09 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The computer attempted to validate the credentials for an account.
Authentication Package:	MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account:	Admin
Source Workstation:	CHH1-832929-1
Error Code:	0x0 | 4776 | 0 |  | 0 | 14336 | 0 | -9214364837600034816 | 14176 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:04:09 AM | 3fe8e847-3455-0004-c2e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Credential Validation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Cryptographic operation.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	RSA
	Key Name:	2918b4e7-76e8-40a6-811b-dfe4e3ba9c02
	Key Type:	Machine key.
Cryptographic Operation:
	Operation:	Open Key.
	Return Code:	0x0 | 5061 | 0 |  | 0 | 12290 | 0 | -9214364837600034816 | 14175 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:04:09 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | System Integrity | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Key file operation.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	UNKNOWN
	Key Name:	2918b4e7-76e8-40a6-811b-dfe4e3ba9c02
	Key Type:	Machine key.
Key File Operation Information:
	File Path:	C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\5cf5daefd59ffe267deaaa220897ebe2_afd319b1-89fc-40d0-a8c3-fb9a30758cc0
	Operation:	Read persisted key from file.
	Return Code:	0x0 | 5058 | 0 |  | 0 | 12292 | 0 | -9214364837600034816 | 14174 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:04:09 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other System Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An attempt was made to reset an account's password.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x5353F
Target Account:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1 | 4724 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14173 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:04:06 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A user account was changed.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x5353F
Target Account:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
Changed Attributes:
	SAM Account Name:	Admin
	Display Name:		Admin
	User Principal Name:	-
	Home Directory:		<value not set>
	Home Drive:		<value not set>
	Script Path:		<value not set>
	Profile Path:		<value not set>
	User Workstations:	<value not set>
	Password Last Set:	3/10/2022 8:04:06 AM
	Account Expires:		<never>
	Primary Group ID:	513
	AllowedToDelegateTo:	-
	Old UAC Value:		0x210
	New UAC Value:		0x210
	User Account Control:	-
	User Parameters:	-
	SID History:		-
	Logon Hours:		All
Additional Information:
	Privileges:		- | 4738 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14172 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:04:06 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A user's local group membership was enumerated.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x5353F
User:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
Process Information:
	Process ID:		0x48c
	Process Name:		C:\Program Files\Cloudbase Solutions\Cloudbase-Init\Python\python.exe | 4798 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14171 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:04:06 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A user's local group membership was enumerated.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x5353F
User:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
Process Information:
	Process ID:		0x48c
	Process Name:		C:\Program Files\Cloudbase Solutions\Cloudbase-Init\Python\python.exe | 4798 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14170 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:04:06 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A user's local group membership was enumerated.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x5353F
User:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
Process Information:
	Process ID:		0x48c
	Process Name:		C:\Program Files\Cloudbase Solutions\Cloudbase-Init\Python\python.exe | 4798 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14169 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:04:06 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14168 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:04:01 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x320
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14167 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:04:01 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A user's local group membership was enumerated.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x5353F
User:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
Process Information:
	Process ID:		0x48c
	Process Name:		C:\Program Files\Cloudbase Solutions\Cloudbase-Init\Python\python.exe | 4798 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14166 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:04:01 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A member was added to a security-enabled local group.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x5353F
Member:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		-
Group:
	Security ID:		S-1-5-32-544
	Group Name:		Administrators
	Group Domain:		Builtin
Additional Information:
	Privileges:		- | 4732 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14165 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:04:00 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was logged off.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0x89E58
Logon Type:			2
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. | 4634 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 14164 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:04:00 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x5353F
Group:
	Security ID:		S-1-5-32-544
	Group Name:		Administrators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x224
	Process Name:		C:\Windows\System32\svchost.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14163 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:04:00 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x5353F
Logon Information:
	Logon Type:		2
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		No
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon ID:		0x89E58
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x48c
	Process Name:		C:\Program Files\Cloudbase Solutions\Cloudbase-Init\Python\python.exe
Network Information:
	Workstation Name:	CHH1-832929-1
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14162 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:03:59 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x5353F
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x48c
	Process Name:		C:\Program Files\Cloudbase Solutions\Cloudbase-Init\Python\python.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14161 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:03:59 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The computer attempted to validate the credentials for an account.
Authentication Package:	MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account:	Admin
Source Workstation:	CHH1-832929-1
Error Code:	0x0 | 4776 | 0 |  | 0 | 14336 | 0 | -9214364837600034816 | 14160 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:03:59 AM | 3fe8e847-3455-0001-c1e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Credential Validation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An attempt was made to reset an account's password.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x5353F
Target Account:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1 | 4724 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14159 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:03:54 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A user account was changed.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x5353F
Target Account:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
Changed Attributes:
	SAM Account Name:	Admin
	Display Name:		Admin
	User Principal Name:	-
	Home Directory:		<value not set>
	Home Drive:		<value not set>
	Script Path:		<value not set>
	Profile Path:		<value not set>
	User Workstations:	<value not set>
	Password Last Set:	3/10/2022 8:03:54 AM
	Account Expires:		<never>
	Primary Group ID:	513
	AllowedToDelegateTo:	-
	Old UAC Value:		0x15
	New UAC Value:		0x210
	User Account Control:	
		Account Enabled
		'Password Not Required' - Disabled
		'Don't Expire Password' - Enabled
	User Parameters:	-
	SID History:		-
	Logon Hours:		All
Additional Information:
	Privileges:		- | 4738 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14158 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:03:54 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A user account was enabled.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x5353F
Target Account:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1 | 4722 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14157 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:03:54 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A user account was created.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x5353F
New Account:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		Admin
	Account Domain:		CHH1-832929-1
Attributes:
	SAM Account Name:	Admin
	Display Name:		<value not set>
	User Principal Name:	-
	Home Directory:		<value not set>
	Home Drive:		<value not set>
	Script Path:		<value not set>
	Profile Path:		<value not set>
	User Workstations:	<value not set>
	Password Last Set:	<never>
	Account Expires:		<never>
	Primary Group ID:	513
	Allowed To Delegate To:	-
	Old UAC Value:		0x0
	New UAC Value:		0x15
	User Account Control:	
		Account Disabled
		'Password Not Required' - Enabled
		'Normal Account' - Enabled
	User Parameters:	<value not set>
	SID History:		-
	Logon Hours:		All
Additional Information:
	Privileges		- | 4720 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14156 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:03:54 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A member was added to a security-enabled global group.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x5353F
Member:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1001
	Account Name:		-
Group:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-513
	Group Name:		None
	Group Domain:		CHH1-832929-1
Additional Information:
	Privileges:		- | 4728 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14155 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:03:54 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x5353F
Privileges:		SeAssignPrimaryTokenPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14154 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:30 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x2AF11
Logon Information:
	Logon Type:		4
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x5353F
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0xec8
	Process Name:		C:\Program Files\Cloudbase Solutions\Cloudbase-Init\Python\python.exe
Network Information:
	Workstation Name:	CHH1-832929-1
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14153 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:30 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The computer attempted to validate the credentials for an account.
Authentication Package:	MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account:	cloudbase-init
Source Workstation:	CHH1-832929-1
Error Code:	0x0 | 4776 | 0 |  | 0 | 14336 | 0 | -9214364837600034816 | 14152 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:30 AM | 3fe8e847-3455-0003-9de8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Credential Validation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An attempt was made to reset an account's password.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x2AF11
Target Account:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1 | 4724 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14151 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:30 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A user account was changed.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x2AF11
Target Account:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
Changed Attributes:
	SAM Account Name:	cloudbase-init
	Display Name:		cloudbase-init
	User Principal Name:	-
	Home Directory:		<value not set>
	Home Drive:		<value not set>
	Script Path:		<value not set>
	Profile Path:		<value not set>
	User Workstations:	<value not set>
	Password Last Set:	3/10/2022 8:03:30 AM
	Account Expires:		<never>
	Primary Group ID:	513
	AllowedToDelegateTo:	-
	Old UAC Value:		0x210
	New UAC Value:		0x210
	User Account Control:	-
	User Parameters:	-
	SID History:		-
	Logon Hours:		All
Additional Information:
	Privileges:		- | 4738 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14150 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:30 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A user's local group membership was enumerated.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x2AF11
User:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
Process Information:
	Process ID:		0xec8
	Process Name:		C:\Program Files\Cloudbase Solutions\Cloudbase-Init\Python\python.exe | 4798 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14149 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:30 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A user's local group membership was enumerated.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x2AF11
User:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
Process Information:
	Process ID:		0xec8
	Process Name:		C:\Program Files\Cloudbase Solutions\Cloudbase-Init\Python\python.exe | 4798 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14148 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:30 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14147 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:30 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x320
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14146 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:30 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account failed to log on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Type:			2
Account For Which Logon Failed:
	Security ID:		S-1-0-0
	Account Name:		Administrator
	Account Domain:		CHH1-832929-1
Failure Information:
	Failure Reason:		The specified account's password has expired.
	Status:			0xC0000224
	Sub Status:		0x0
Process Information:
	Caller Process ID:	0x224
	Caller Process Name:	C:\Windows\System32\svchost.exe
Network Information:
	Workstation Name:	CHH1-832929-1
	Source Network Address:	127.0.0.1
	Source Port:		0
Detailed Authentication Information:
	Logon Process:		User32 
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon request fails. It is generated on the computer where access was attempted.
The Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).
The Process Information fields indicate which account and process on the system requested the logon.
The Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this specific logon request.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4625 | 0 |  | 0 | 12544 | 0 | -9218868437227405312 | 14145 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:30 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A user's local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
User:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-500
	Account Name:		Administrator
	Account Domain:		CHH1-832929-1
Process Information:
	Process ID:		0xfc8
	Process Name:		C:\Windows\System32\LogonUI.exe | 4798 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14144 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:30 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-551
	Group Name:		Backup Operators
	Group Domain:		Builtin
Process Information:
	Process ID:		0xa30
	Process Name:		C:\Windows\System32\vmms.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14143 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 896 | chh1-832929-1 |  | 3/10/2022 8:03:27 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-544
	Group Name:		Administrators
	Group Domain:		Builtin
Process Information:
	Process ID:		0xa30
	Process Name:		C:\Windows\System32\vmms.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14142 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 896 | chh1-832929-1 |  | 3/10/2022 8:03:27 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14141 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:26 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x320
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14140 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:26 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Cryptographic operation.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	RSA
	Key Name:	d333d640-a50f-7cdf-7d80-d8d5ae7a9b11
	Key Type:	User key.
Cryptographic Operation:
	Operation:	Open Key.
	Return Code:	0x0 | 5061 | 0 |  | 0 | 12290 | 0 | -9214364837600034816 | 14139 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:26 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | System Integrity | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Key file operation.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	UNKNOWN
	Key Name:	d333d640-a50f-7cdf-7d80-d8d5ae7a9b11
	Key Type:	User key.
Key File Operation Information:
	File Path:	C:\ProgramData\Microsoft\Crypto\SystemKeys\63819b95e4646e20a43fc837afb825c9_6f209d63-1e80-4632-84d6-2afc9405ddcc
	Operation:	Read persisted key from file.
	Return Code:	0x0 | 5058 | 0 |  | 0 | 12292 | 0 | -9214364837600034816 | 14138 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:26 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other System Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-544
	Group Name:		Administrators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x224
	Process Name:		C:\Windows\System32\svchost.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14137 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 896 | chh1-832929-1 |  | 3/10/2022 8:03:25 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Cryptographic operation.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	RSA
	Key Name:	TSSecKeySet1
	Key Type:	Machine key.
Cryptographic Operation:
	Operation:	Open Key.
	Return Code:	0x0 | 5061 | 0 |  | 0 | 12290 | 0 | -9214364837600034816 | 14136 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:23 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | System Integrity | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Key file operation.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	UNKNOWN
	Key Name:	TSSecKeySet1
	Key Type:	Machine key.
Key File Operation Information:
	File Path:	C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\f686aace6942fb7f7ceb231212eef4a4_afd319b1-89fc-40d0-a8c3-fb9a30758cc0
	Operation:	Read persisted key from file.
	Return Code:	0x0 | 5058 | 0 |  | 0 | 12292 | 0 | -9214364837600034816 | 14135 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:23 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other System Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Cryptographic operation.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	RSA
	Key Name:	TSSecKeySet1
	Key Type:	Machine key.
Cryptographic Operation:
	Operation:	Open Key.
	Return Code:	0x0 | 5061 | 0 |  | 0 | 12290 | 0 | -9214364837600034816 | 14134 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:23 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | System Integrity | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Key file operation.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	UNKNOWN
	Key Name:	TSSecKeySet1
	Key Type:	Machine key.
Key File Operation Information:
	File Path:	C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\f686aace6942fb7f7ceb231212eef4a4_afd319b1-89fc-40d0-a8c3-fb9a30758cc0
	Operation:	Read persisted key from file.
	Return Code:	0x0 | 5058 | 0 |  | 0 | 12292 | 0 | -9214364837600034816 | 14133 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 896 | chh1-832929-1 |  | 3/10/2022 8:03:23 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other System Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x2AF11
Privileges:		SeAssignPrimaryTokenPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14132 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:03:23 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon ID:		0x2AF11
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x320
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	CHH1-832929-1
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14131 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:03:23 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		cloudbase-init
	Account Domain:		CHH1-832929-1
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x320
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 14130 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:03:23 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The computer attempted to validate the credentials for an account.
Authentication Package:	MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account:	cloudbase-init
Source Workstation:	CHH1-832929-1
Error Code:	0x0 | 4776 | 0 |  | 0 | 14336 | 0 | -9214364837600034816 | 14129 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:03:23 AM | 3fe8e847-3455-0001-80e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Credential Validation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Key migration operation.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	RSA
	Key Name:	d333d640-a50f-7cdf-7d80-d8d5ae7a9b11
	Key Type:	User key.
Additional Information:
	Operation:	Export of persistent cryptographic key.
	Return Code:	0x0 | 5059 | 0 |  | 0 | 12292 | 0 | -9214364837600034816 | 14128 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:03:21 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other System Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Cryptographic operation.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	RSA
	Key Name:	d333d640-a50f-7cdf-7d80-d8d5ae7a9b11
	Key Type:	User key.
Cryptographic Operation:
	Operation:	Open Key.
	Return Code:	0x0 | 5061 | 0 |  | 0 | 12290 | 0 | -9214364837600034816 | 14127 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:03:21 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | System Integrity | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Key file operation.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	UNKNOWN
	Key Name:	d333d640-a50f-7cdf-7d80-d8d5ae7a9b11
	Key Type:	User key.
Key File Operation Information:
	File Path:	C:\ProgramData\Microsoft\Crypto\SystemKeys\63819b95e4646e20a43fc837afb825c9_6f209d63-1e80-4632-84d6-2afc9405ddcc
	Operation:	Read persisted key from file.
	Return Code:	0x0 | 5058 | 0 |  | 0 | 12292 | 0 | -9214364837600034816 | 14126 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:03:21 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other System Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Cryptographic operation.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	RSA
	Key Name:	d333d640-a50f-7cdf-7d80-d8d5ae7a9b11
	Key Type:	User key.
Cryptographic Operation:
	Operation:	Open Key.
	Return Code:	0x0 | 5061 | 0 |  | 0 | 12290 | 0 | -9214364837600034816 | 14125 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:03:21 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | System Integrity | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Key file operation.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	UNKNOWN
	Key Name:	d333d640-a50f-7cdf-7d80-d8d5ae7a9b11
	Key Type:	User key.
Key File Operation Information:
	File Path:	C:\ProgramData\Microsoft\Crypto\SystemKeys\63819b95e4646e20a43fc837afb825c9_6f209d63-1e80-4632-84d6-2afc9405ddcc
	Operation:	Read persisted key from file.
	Return Code:	0x0 | 5058 | 0 |  | 0 | 12292 | 0 | -9214364837600034816 | 14124 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 856 | chh1-832929-1 |  | 3/10/2022 8:03:21 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other System Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14123 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 896 | chh1-832929-1 |  | 3/10/2022 8:03:21 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x320
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14122 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 896 | chh1-832929-1 |  | 3/10/2022 8:03:21 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14121 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 896 | chh1-832929-1 |  | 3/10/2022 8:03:20 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x320
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14120 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 896 | chh1-832929-1 |  | 3/10/2022 8:03:20 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The Windows Firewall service started successfully. | 5024 | 0 |  | 0 | 12292 | 0 | -9214364837600034816 | 14119 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:03:20 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other System Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		No
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-7
	Account Name:		ANONYMOUS LOGON
	Account Domain:		NT AUTHORITY
	Logon ID:		0x20B22
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		NtLmSsp 
	Authentication Package:	NTLM
	Transited Services:	-
	Package Name (NTLM only):	NTLM V1
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14118 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:20 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14117 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:03:19 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x320
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14116 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:03:19 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14115 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:19 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x320
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14114 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:19 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14113 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:03:19 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x320
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14112 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:03:19 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14111 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 896 | chh1-832929-1 |  | 3/10/2022 8:03:19 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x320
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14110 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 896 | chh1-832929-1 |  | 3/10/2022 8:03:19 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14109 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:03:19 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x320
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14108 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:03:19 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-544
	Group Name:		Administrators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x224
	Process Name:		C:\Windows\System32\svchost.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14107 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:03:19 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The Windows Firewall Driver started successfully. | 5033 | 0 |  | 0 | 12292 | 0 | -9214364837600034816 | 14106 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 512 | chh1-832929-1 |  | 3/10/2022 8:03:19 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other System Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-551
	Group Name:		Backup Operators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x224
	Process Name:		C:\Windows\System32\svchost.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14105 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 896 | chh1-832929-1 |  | 3/10/2022 8:03:19 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-544
	Group Name:		Administrators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x224
	Process Name:		C:\Windows\System32\svchost.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14104 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 896 | chh1-832929-1 |  | 3/10/2022 8:03:19 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-20
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E4
Group:
	Security ID:		S-1-5-32-551
	Group Name:		Backup Operators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x530
	Process Name:		C:\Windows\System32\svchost.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14103 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 896 | chh1-832929-1 |  | 3/10/2022 8:03:19 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-20
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E4
Group:
	Security ID:		S-1-5-32-544
	Group Name:		Administrators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x530
	Process Name:		C:\Windows\System32\svchost.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14102 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 896 | chh1-832929-1 |  | 3/10/2022 8:03:19 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-551
	Group Name:		Backup Operators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x4cc
	Process Name:		C:\Windows\System32\VSSVC.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14101 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:03:19 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-544
	Group Name:		Administrators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x4cc
	Process Name:		C:\Windows\System32\VSSVC.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14100 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:03:19 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-551
	Group Name:		Backup Operators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x4cc
	Process Name:		C:\Windows\System32\VSSVC.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14099 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 896 | chh1-832929-1 |  | 3/10/2022 8:03:19 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-544
	Group Name:		Administrators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x4cc
	Process Name:		C:\Windows\System32\VSSVC.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14098 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 896 | chh1-832929-1 |  | 3/10/2022 8:03:19 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-551
	Group Name:		Backup Operators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x4cc
	Process Name:		C:\Windows\System32\VSSVC.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14097 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 896 | chh1-832929-1 |  | 3/10/2022 8:03:19 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-544
	Group Name:		Administrators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x4cc
	Process Name:		C:\Windows\System32\VSSVC.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14096 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 896 | chh1-832929-1 |  | 3/10/2022 8:03:19 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-551
	Group Name:		Backup Operators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x4cc
	Process Name:		C:\Windows\System32\VSSVC.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14095 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 896 | chh1-832929-1 |  | 3/10/2022 8:03:19 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-544
	Group Name:		Administrators
	Group Domain:		Builtin
Process Information:
	Process ID:		0x4cc
	Process Name:		C:\Windows\System32\VSSVC.exe | 4799 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14094 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 896 | chh1-832929-1 |  | 3/10/2022 8:03:19 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14093 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 896 | chh1-832929-1 |  | 3/10/2022 8:03:19 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x320
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14092 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 896 | chh1-832929-1 |  | 3/10/2022 8:03:19 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14091 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 896 | chh1-832929-1 |  | 3/10/2022 8:03:19 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x320
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14090 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 896 | chh1-832929-1 |  | 3/10/2022 8:03:19 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The system time was changed.
Subject:
	Security ID:		S-1-5-19
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E5
Process Information:
	Process ID:	0x58c
	Name:		C:\Windows\System32\svchost.exe
Previous Time:		?2022?-?03?-?10T08:03:17.632167800Z
New Time:		?2022?-?03?-?10T08:03:18.474000000Z
This event is generated when the system time is changed. It is normal for the Windows Time Service, which runs with System privilege, to change the system time on a regular basis. Other system time changes may be indicative of attempts to tamper with the computer. | 4616 | 1 |  | 0 | 12288 | 0 | -9214364837600034816 | 14089 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 384 | chh1-832929-1 |  | 3/10/2022 8:03:18 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security State Change | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14088 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:03:17 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x320
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14087 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:03:17 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Auditing settings on object were changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Object:
	Object Server:	Security
	Object Type:	File
	Object Name:	C:\Windows\Temp\winre\ExtractedFromWim
	Handle ID:	0x4fc
Process Information:
	Process ID:	0x508
	Process Name:	C:\Windows\System32\oobe\msoobe.exe
Auditing Settings:
	Original Security Descriptor:	
	New Security Descriptor:		S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD) | 4907 | 0 |  | 0 | 13568 | 0 | -9214364837600034816 | 14086 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 508 | chh1-832929-1 |  | 3/10/2022 8:03:17 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Audit Policy Change | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14085 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:03:17 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x320
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14084 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 848 | chh1-832929-1 |  | 3/10/2022 8:03:17 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14083 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:17 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x320
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 14082 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:17 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled global group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-513
	Group Name:		None
	Group Domain:		CHH1-832929-1
Changed Attributes:
	SAM Account Name:	None
	SID History:		-
Additional Information:
	Privileges:		- | 4737 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14081 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The name of an account was changed:
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-513
	Account Domain:		CHH1-832929-1
	Old Account Name:	None
	New Account Name:	None
Additional Information:
	Privileges:		- | 4781 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14080 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled global group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-513
	Group Name:		None
	Group Domain:		CHH1-832929-1
Changed Attributes:
	SAM Account Name:	-
	SID History:		-
Additional Information:
	Privileges:		- | 4737 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14079 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A user account was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-503
	Account Name:		DefaultAccount
	Account Domain:		CHH1-832929-1
Changed Attributes:
	SAM Account Name:	DefaultAccount
	Display Name:		<value not set>
	User Principal Name:	-
	Home Directory:		<value not set>
	Home Drive:		<value not set>
	Script Path:		<value not set>
	Profile Path:		<value not set>
	User Workstations:	<value not set>
	Password Last Set:	<never>
	Account Expires:		<never>
	Primary Group ID:	513
	AllowedToDelegateTo:	-
	Old UAC Value:		0x215
	New UAC Value:		0x215
	User Account Control:	-
	User Parameters:	<value not set>
	SID History:		-
	Logon Hours:		All
Additional Information:
	Privileges:		- | 4738 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14078 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A user account was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-503
	Account Name:		DefaultAccount
	Account Domain:		CHH1-832929-1
Changed Attributes:
	SAM Account Name:	DefaultAccount
	Display Name:		<value not set>
	User Principal Name:	-
	Home Directory:		<value not set>
	Home Drive:		<value not set>
	Script Path:		<value not set>
	Profile Path:		<value not set>
	User Workstations:	<value not set>
	Password Last Set:	<never>
	Account Expires:		<never>
	Primary Group ID:	513
	AllowedToDelegateTo:	-
	Old UAC Value:		0x215
	New UAC Value:		0x215
	User Account Control:	-
	User Parameters:	<value not set>
	SID History:		-
	Logon Hours:		All
Additional Information:
	Privileges:		- | 4738 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14077 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A user account was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-501
	Account Name:		Guest
	Account Domain:		CHH1-832929-1
Changed Attributes:
	SAM Account Name:	Guest
	Display Name:		<value not set>
	User Principal Name:	-
	Home Directory:		<value not set>
	Home Drive:		<value not set>
	Script Path:		<value not set>
	Profile Path:		<value not set>
	User Workstations:	<value not set>
	Password Last Set:	<never>
	Account Expires:		<never>
	Primary Group ID:	513
	AllowedToDelegateTo:	-
	Old UAC Value:		0x215
	New UAC Value:		0x215
	User Account Control:	-
	User Parameters:	<value not set>
	SID History:		-
	Logon Hours:		All
Additional Information:
	Privileges:		- | 4738 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14076 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A user account was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-501
	Account Name:		Guest
	Account Domain:		CHH1-832929-1
Changed Attributes:
	SAM Account Name:	Guest
	Display Name:		<value not set>
	User Principal Name:	-
	Home Directory:		<value not set>
	Home Drive:		<value not set>
	Script Path:		<value not set>
	Profile Path:		<value not set>
	User Workstations:	<value not set>
	Password Last Set:	<never>
	Account Expires:		<never>
	Primary Group ID:	513
	AllowedToDelegateTo:	-
	Old UAC Value:		0x215
	New UAC Value:		0x215
	User Account Control:	-
	User Parameters:	<value not set>
	SID History:		-
	Logon Hours:		All
Additional Information:
	Privileges:		- | 4738 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14075 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A user account was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-500
	Account Name:		Administrator
	Account Domain:		CHH1-832929-1
Changed Attributes:
	SAM Account Name:	Administrator
	Display Name:		<value not set>
	User Principal Name:	-
	Home Directory:		<value not set>
	Home Drive:		<value not set>
	Script Path:		<value not set>
	Profile Path:		<value not set>
	User Workstations:	<value not set>
	Password Last Set:	<never>
	Account Expires:		<never>
	Primary Group ID:	513
	AllowedToDelegateTo:	-
	Old UAC Value:		0x10
	New UAC Value:		0x10
	User Account Control:	-
	User Parameters:	<value not set>
	SID History:		-
	Logon Hours:		All
Additional Information:
	Privileges:		- | 4738 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14074 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A user account was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-500
	Account Name:		Administrator
	Account Domain:		CHH1-832929-1
Changed Attributes:
	SAM Account Name:	Administrator
	Display Name:		<value not set>
	User Principal Name:	-
	Home Directory:		<value not set>
	Home Drive:		<value not set>
	Script Path:		<value not set>
	Profile Path:		<value not set>
	User Workstations:	<value not set>
	Password Last Set:	<never>
	Account Expires:		<never>
	Primary Group ID:	513
	AllowedToDelegateTo:	-
	Old UAC Value:		0x10
	New UAC Value:		0x10
	User Account Control:	-
	User Parameters:	<value not set>
	SID History:		-
	Logon Hours:		All
Additional Information:
	Privileges:		- | 4738 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14073 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-581
	Group Name:		System Managed Accounts Group
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	System Managed Accounts Group
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14072 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The name of an account was changed:
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-32-581
	Account Domain:		Builtin
	Old Account Name:	System Managed Accounts Group
	New Account Name:	System Managed Accounts Group
Additional Information:
	Privileges:		- | 4781 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14071 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-581
	Group Name:		System Managed Accounts Group
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	-
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14070 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-582
	Group Name:		Storage Replica Administrators
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	Storage Replica Administrators
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14069 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The name of an account was changed:
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-32-582
	Account Domain:		Builtin
	Old Account Name:	Storage Replica Administrators
	New Account Name:	Storage Replica Administrators
Additional Information:
	Privileges:		- | 4781 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14068 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-582
	Group Name:		Storage Replica Administrators
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	-
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14067 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-580
	Group Name:		Remote Management Users
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	Remote Management Users
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14066 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The name of an account was changed:
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-32-580
	Account Domain:		Builtin
	Old Account Name:	Remote Management Users
	New Account Name:	Remote Management Users
Additional Information:
	Privileges:		- | 4781 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14065 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-580
	Group Name:		Remote Management Users
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	-
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14064 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-579
	Group Name:		Access Control Assistance Operators
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	Access Control Assistance Operators
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14063 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The name of an account was changed:
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-32-579
	Account Domain:		Builtin
	Old Account Name:	Access Control Assistance Operators
	New Account Name:	Access Control Assistance Operators
Additional Information:
	Privileges:		- | 4781 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14062 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-579
	Group Name:		Access Control Assistance Operators
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	-
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14061 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-578
	Group Name:		Hyper-V Administrators
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	Hyper-V Administrators
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14060 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The name of an account was changed:
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-32-578
	Account Domain:		Builtin
	Old Account Name:	Hyper-V Administrators
	New Account Name:	Hyper-V Administrators
Additional Information:
	Privileges:		- | 4781 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14059 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-578
	Group Name:		Hyper-V Administrators
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	-
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14058 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-577
	Group Name:		RDS Management Servers
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	RDS Management Servers
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14057 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The name of an account was changed:
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-32-577
	Account Domain:		Builtin
	Old Account Name:	RDS Management Servers
	New Account Name:	RDS Management Servers
Additional Information:
	Privileges:		- | 4781 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14056 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-577
	Group Name:		RDS Management Servers
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	-
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14055 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-576
	Group Name:		RDS Endpoint Servers
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	RDS Endpoint Servers
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14054 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The name of an account was changed:
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-32-576
	Account Domain:		Builtin
	Old Account Name:	RDS Endpoint Servers
	New Account Name:	RDS Endpoint Servers
Additional Information:
	Privileges:		- | 4781 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14053 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-576
	Group Name:		RDS Endpoint Servers
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	-
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14052 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-575
	Group Name:		RDS Remote Access Servers
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	RDS Remote Access Servers
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14051 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The name of an account was changed:
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-32-575
	Account Domain:		Builtin
	Old Account Name:	RDS Remote Access Servers
	New Account Name:	RDS Remote Access Servers
Additional Information:
	Privileges:		- | 4781 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14050 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-575
	Group Name:		RDS Remote Access Servers
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	-
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14049 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-574
	Group Name:		Certificate Service DCOM Access
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	Certificate Service DCOM Access
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14048 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The name of an account was changed:
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-32-574
	Account Domain:		Builtin
	Old Account Name:	Certificate Service DCOM Access
	New Account Name:	Certificate Service DCOM Access
Additional Information:
	Privileges:		- | 4781 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14047 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-574
	Group Name:		Certificate Service DCOM Access
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	-
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14046 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-573
	Group Name:		Event Log Readers
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	Event Log Readers
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14045 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The name of an account was changed:
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-32-573
	Account Domain:		Builtin
	Old Account Name:	Event Log Readers
	New Account Name:	Event Log Readers
Additional Information:
	Privileges:		- | 4781 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14044 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-573
	Group Name:		Event Log Readers
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	-
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14043 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-569
	Group Name:		Cryptographic Operators
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	Cryptographic Operators
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14042 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The name of an account was changed:
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-32-569
	Account Domain:		Builtin
	Old Account Name:	Cryptographic Operators
	New Account Name:	Cryptographic Operators
Additional Information:
	Privileges:		- | 4781 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14041 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-569
	Group Name:		Cryptographic Operators
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	-
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14040 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-568
	Group Name:		IIS_IUSRS
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	IIS_IUSRS
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14039 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The name of an account was changed:
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-32-568
	Account Domain:		Builtin
	Old Account Name:	IIS_IUSRS
	New Account Name:	IIS_IUSRS
Additional Information:
	Privileges:		- | 4781 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14038 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-568
	Group Name:		IIS_IUSRS
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	-
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14037 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-562
	Group Name:		Distributed COM Users
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	Distributed COM Users
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14036 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The name of an account was changed:
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-32-562
	Account Domain:		Builtin
	Old Account Name:	Distributed COM Users
	New Account Name:	Distributed COM Users
Additional Information:
	Privileges:		- | 4781 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14035 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-562
	Group Name:		Distributed COM Users
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	-
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14034 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-559
	Group Name:		Performance Log Users
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	Performance Log Users
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14033 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The name of an account was changed:
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-32-559
	Account Domain:		Builtin
	Old Account Name:	Performance Log Users
	New Account Name:	Performance Log Users
Additional Information:
	Privileges:		- | 4781 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14032 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-559
	Group Name:		Performance Log Users
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	-
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14031 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-558
	Group Name:		Performance Monitor Users
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	Performance Monitor Users
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14030 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The name of an account was changed:
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-32-558
	Account Domain:		Builtin
	Old Account Name:	Performance Monitor Users
	New Account Name:	Performance Monitor Users
Additional Information:
	Privileges:		- | 4781 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14029 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-558
	Group Name:		Performance Monitor Users
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	-
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14028 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-547
	Group Name:		Power Users
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	Power Users
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14027 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The name of an account was changed:
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-32-547
	Account Domain:		Builtin
	Old Account Name:	Power Users
	New Account Name:	Power Users
Additional Information:
	Privileges:		- | 4781 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14026 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-547
	Group Name:		Power Users
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	-
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14025 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-556
	Group Name:		Network Configuration Operators
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	Network Configuration Operators
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14024 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The name of an account was changed:
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-32-556
	Account Domain:		Builtin
	Old Account Name:	Network Configuration Operators
	New Account Name:	Network Configuration Operators
Additional Information:
	Privileges:		- | 4781 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14023 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-556
	Group Name:		Network Configuration Operators
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	-
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14022 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-555
	Group Name:		Remote Desktop Users
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	Remote Desktop Users
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14021 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The name of an account was changed:
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-32-555
	Account Domain:		Builtin
	Old Account Name:	Remote Desktop Users
	New Account Name:	Remote Desktop Users
Additional Information:
	Privileges:		- | 4781 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14020 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-555
	Group Name:		Remote Desktop Users
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	-
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14019 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-552
	Group Name:		Replicator
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	Replicator
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14018 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The name of an account was changed:
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-32-552
	Account Domain:		Builtin
	Old Account Name:	Replicator
	New Account Name:	Replicator
Additional Information:
	Privileges:		- | 4781 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14017 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-552
	Group Name:		Replicator
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	-
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14016 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-551
	Group Name:		Backup Operators
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	Backup Operators
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14015 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The name of an account was changed:
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-32-551
	Account Domain:		Builtin
	Old Account Name:	Backup Operators
	New Account Name:	Backup Operators
Additional Information:
	Privileges:		- | 4781 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14014 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-551
	Group Name:		Backup Operators
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	-
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14013 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-546
	Group Name:		Guests
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	Guests
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14012 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The name of an account was changed:
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-32-546
	Account Domain:		Builtin
	Old Account Name:	Guests
	New Account Name:	Guests
Additional Information:
	Privileges:		- | 4781 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14011 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-546
	Group Name:		Guests
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	-
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14010 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-545
	Group Name:		Users
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	Users
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14009 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The name of an account was changed:
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-32-545
	Account Domain:		Builtin
	Old Account Name:	Users
	New Account Name:	Users
Additional Information:
	Privileges:		- | 4781 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14008 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-545
	Group Name:		Users
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	-
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14007 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-544
	Group Name:		Administrators
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	Administrators
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14006 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The name of an account was changed:
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-32-544
	Account Domain:		Builtin
	Old Account Name:	Administrators
	New Account Name:	Administrators
Additional Information:
	Privileges:		- | 4781 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14005 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-544
	Group Name:		Administrators
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	-
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14004 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-550
	Group Name:		Print Operators
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	Print Operators
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14003 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The name of an account was changed:
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-32-550
	Account Domain:		Builtin
	Old Account Name:	Print Operators
	New Account Name:	Print Operators
Additional Information:
	Privileges:		- | 4781 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 14002 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A security-enabled local group was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Group:
	Security ID:		S-1-5-32-550
	Group Name:		Print Operators
	Group Domain:		Builtin
Changed Attributes:
	SAM Account Name:	-
	SID History:		-
Additional Information:
	Privileges:		- | 4735 | 0 |  | 0 | 13826 | 0 | -9214364837600034816 | 14001 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:15 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security Group Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 14000 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:04 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x320
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13999 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:04 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 13998 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:04 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x320
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13997 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:04 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-19
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E5
Privileges:		SeAssignPrimaryTokenPrivilege
			SeAuditPrivilege
			SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 13996 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:04 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-19
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E5
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x320
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13995 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:04 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 13994 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:03 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x320
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13993 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:03 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-90-0-1
	Account Name:		DWM-1
	Account Domain:		Window Manager
	Logon ID:		0xB5A5
Privileges:		SeAssignPrimaryTokenPrivilege
			SeAuditPrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 13992 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:03 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-90-0-1
	Account Name:		DWM-1
	Account Domain:		Window Manager
	Logon ID:		0xB592
Privileges:		SeAssignPrimaryTokenPrivilege
			SeAuditPrivilege
			SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 13991 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:03 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		2
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		No
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-90-0-1
	Account Name:		DWM-1
	Account Domain:		Window Manager
	Logon ID:		0xB5A5
	Linked Logon ID:		0xB592
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x2d8
	Process Name:		C:\Windows\System32\winlogon.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13990 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:03 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		2
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-90-0-1
	Account Name:		DWM-1
	Account Domain:		Window Manager
	Logon ID:		0xB592
	Linked Logon ID:		0xB5A5
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x2d8
	Process Name:		C:\Windows\System32\winlogon.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13989 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:03 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DWM-1
	Account Domain:		Window Manager
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x2d8
	Process Name:		C:\Windows\System32\winlogon.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 13988 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 892 | chh1-832929-1 |  | 3/10/2022 8:03:03 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-20
	Account Name:		NETWORK SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E4
Privileges:		SeAssignPrimaryTokenPrivilege
			SeAuditPrivilege
			SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 13987 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 896 | chh1-832929-1 |  | 3/10/2022 8:03:03 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-20
	Account Name:		NETWORK SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E4
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x320
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13986 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 896 | chh1-832929-1 |  | 3/10/2022 8:03:03 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 13985 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 856 | chh1-832929-1 |  | 3/10/2022 8:03:02 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		CHH1-832929-1$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x320
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13984 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 856 | chh1-832929-1 |  | 3/10/2022 8:03:02 AM | 3fe8e847-3455-0002-48e8-e83f5534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The Per-user audit policy table was created.
Number of Elements:	0
Policy ID:	0x61D6 | 4902 | 0 |  | 0 | 13568 | 0 | -9214364837600034816 | 13983 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 860 | chh1-832929-1 |  | 3/10/2022 8:03:02 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Audit Policy Change | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		0
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		-
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x4
	Process Name:		
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		-
	Authentication Package:	-
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13982 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 820 | chh1-832929-1 |  | 3/10/2022 8:03:01 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Windows is starting up.
This event is logged when LSASS.EXE starts and the auditing subsystem is initialized. | 4608 | 0 |  | 0 | 12288 | 0 | -9214364837600034816 | 13981 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 816 | 820 | chh1-832929-1 |  | 3/10/2022 8:03:01 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security State Change | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x330
	New Process Name:	C:\Windows\System32\lsass.exe
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x2b0
	Creator Process Name:	C:\Windows\System32\wininit.exe
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 13980 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 32 | chh1-832929-1 |  | 3/10/2022 8:03:01 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x320
	New Process Name:	C:\Windows\System32\services.exe
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x2b0
	Creator Process Name:	C:\Windows\System32\wininit.exe
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 13979 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 32 | chh1-832929-1 |  | 3/10/2022 8:03:01 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x2d8
	New Process Name:	C:\Windows\System32\winlogon.exe
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x290
	Creator Process Name:	C:\Windows\System32\smss.exe
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 13978 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 136 | chh1-832929-1 |  | 3/10/2022 8:03:00 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x2b0
	New Process Name:	C:\Windows\System32\wininit.exe
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x244
	Creator Process Name:	C:\Windows\System32\smss.exe
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 13977 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 136 | chh1-832929-1 |  | 3/10/2022 8:03:00 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x298
	New Process Name:	C:\Windows\System32\csrss.exe
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x290
	Creator Process Name:	C:\Windows\System32\smss.exe
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 13976 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 136 | chh1-832929-1 |  | 3/10/2022 8:03:00 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x290
	New Process Name:	C:\Windows\System32\smss.exe
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x1d4
	Creator Process Name:	C:\Windows\System32\smss.exe
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 13975 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 136 | chh1-832929-1 |  | 3/10/2022 8:03:00 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x250
	New Process Name:	C:\Windows\System32\csrss.exe
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x244
	Creator Process Name:	C:\Windows\System32\smss.exe
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 13974 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 188 | chh1-832929-1 |  | 3/10/2022 8:03:00 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x244
	New Process Name:	C:\Windows\System32\smss.exe
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x1d4
	Creator Process Name:	C:\Windows\System32\smss.exe
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 13973 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 188 | chh1-832929-1 |  | 3/10/2022 8:03:00 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x214
	New Process Name:	C:\Windows\System32\autochk.exe
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x1d4
	Creator Process Name:	C:\Windows\System32\smss.exe
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 13972 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 228 | chh1-832929-1 |  | 3/10/2022 8:02:57 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x1d4
	New Process Name:	C:\Windows\System32\smss.exe
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x4
	Creator Process Name:	
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 13971 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 136 | chh1-832929-1 |  | 3/10/2022 8:02:57 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x1d0
	New Process Name:	
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x4
	Creator Process Name:	
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 13970 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 136 | chh1-832929-1 |  | 3/10/2022 8:02:57 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Boot Configuration Data loaded.
Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
General Settings:
	Load Options:		-
	Advanced Options:		No
	Configuration Access Policy:	Default
	System Event Logging:	No
	Kernel Debugging:	No
	VSM Launch Type:	Auto
Signature Settings:
	Test Signing:		No
	Flight Signing:		No
	Disable Integrity Checks:	No
HyperVisor Settings:
	HyperVisor Load Options:	-
	HyperVisor Launch Type:	Auto
	HyperVisor Debugging:	No | 4826 | 0 |  | 0 | 13573 | 0 | -9214364837600034816 | 13969 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 136 | chh1-832929-1 |  | 3/10/2022 8:02:57 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other Policy Change Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The system time was changed.
Subject:
	Security ID:		S-1-5-19
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E5
Process Information:
	Process ID:	0x5e0
	Name:		C:\Windows\System32\svchost.exe
Previous Time:		?2022?-?03?-?10T08:02:47.902724700Z
New Time:		?2022?-?03?-?10T08:02:47.899000000Z
This event is generated when the system time is changed. It is normal for the Windows Time Service, which runs with System privilege, to change the system time on a regular basis. Other system time changes may be indicative of attempts to tamper with the computer. | 4616 | 1 |  | 0 | 12288 | 0 | -9214364837600034816 | 13968 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 1456 | WIN-5T344G8GM1H |  | 3/10/2022 8:02:47 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security State Change | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The event logging service has shut down. | 1100 | 0 |  | 4 | 103 | 0 | 4620693217682128896 | 13967 | Microsoft-Windows-Eventlog | fc65ddd8-d6ef-4962-83d5-6e5cfe9ce148 | Security | 1320 | 1544 | WIN-5T344G8GM1H |  | 3/10/2022 8:02:47 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Service shutdown | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 13966 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 864 | WIN-5T344G8GM1H |  | 3/10/2022 8:02:43 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		WIN-5T344G8GM1H$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13965 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 864 | WIN-5T344G8GM1H |  | 3/10/2022 8:02:43 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An attempt was made to reset an account's password.
Subject:
	Security ID:		S-1-5-18
	Account Name:		WIN-5T344G8GM1H$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		WIN-5T344G8GM1H | 4724 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 13964 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 864 | WIN-5T344G8GM1H |  | 3/10/2022 8:02:30 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A user account was changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		WIN-5T344G8GM1H$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Target Account:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		WIN-5T344G8GM1H
Changed Attributes:
	SAM Account Name:	cloudbase-init
	Display Name:		cloudbase-init
	User Principal Name:	-
	Home Directory:		<value not set>
	Home Drive:		<value not set>
	Script Path:		<value not set>
	Profile Path:		<value not set>
	User Workstations:	<value not set>
	Password Last Set:	3/10/2022 8:02:30 AM
	Account Expires:		<never>
	Primary Group ID:	513
	AllowedToDelegateTo:	-
	Old UAC Value:		0x210
	New UAC Value:		0x210
	User Account Control:	-
	User Parameters:	-
	SID History:		-
	Logon Hours:		All
Additional Information:
	Privileges:		- | 4738 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 13963 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 864 | WIN-5T344G8GM1H |  | 3/10/2022 8:02:30 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A user's local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		WIN-5T344G8GM1H$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
User:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		WIN-5T344G8GM1H
Process Information:
	Process ID:		0xa6c
	Process Name:		C:\Program Files\Cloudbase Solutions\Cloudbase-Init\Python\python.exe | 4798 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 13962 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 864 | WIN-5T344G8GM1H |  | 3/10/2022 8:02:30 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A user's local group membership was enumerated.
Subject:
	Security ID:		S-1-5-18
	Account Name:		WIN-5T344G8GM1H$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
User:
	Security ID:		S-1-5-21-2302723854-295832418-3023792030-1000
	Account Name:		cloudbase-init
	Account Domain:		WIN-5T344G8GM1H
Process Information:
	Process ID:		0xa6c
	Process Name:		C:\Program Files\Cloudbase Solutions\Cloudbase-Init\Python\python.exe | 4798 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 13961 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 864 | WIN-5T344G8GM1H |  | 3/10/2022 8:02:30 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Auditing settings on object were changed.
Subject:
	Security ID:		S-1-5-18
	Account Name:		WIN-5T344G8GM1H$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Object:
	Object Server:	Security
	Object Type:	File
	Object Name:	C:\Windows\Temp\winre\ExtractedFromWim
	Handle ID:	0x380
Process Information:
	Process ID:	0x4b0
	Process Name:	C:\Windows\System32\oobe\Setup.exe
Auditing Settings:
	Original Security Descriptor:	
	New Security Descriptor:		S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD) | 4907 | 0 |  | 0 | 13568 | 0 | -9214364837600034816 | 13960 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 136 | WIN-5T344G8GM1H |  | 3/10/2022 8:02:03 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Audit Policy Change | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 13959 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:55 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		WIN-5T344G8GM1H$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13958 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:55 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The Windows Firewall service started successfully. | 5024 | 0 |  | 0 | 12292 | 0 | -9214364837600034816 | 13957 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:51 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other System Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		No
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-7
	Account Name:		ANONYMOUS LOGON
	Account Domain:		NT AUTHORITY
	Logon ID:		0x63AAE
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x0
	Process Name:		-
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		NtLmSsp 
	Authentication Package:	NTLM
	Transited Services:	-
	Package Name (NTLM only):	NTLM V1
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13956 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:50 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 13955 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 872 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:50 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		WIN-5T344G8GM1H$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13954 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 872 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:50 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 13953 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 864 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:50 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		WIN-5T344G8GM1H$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13952 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 864 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:50 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 13951 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 864 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:50 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		WIN-5T344G8GM1H$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13950 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 864 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:50 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 13949 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 864 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:50 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		WIN-5T344G8GM1H$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13948 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 864 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:50 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 13947 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 864 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:49 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		WIN-5T344G8GM1H$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13946 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 864 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:49 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The Windows Firewall Driver started successfully. | 5033 | 0 |  | 0 | 12292 | 0 | -9214364837600034816 | 13945 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 596 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:49 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other System Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 13944 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 872 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:48 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		WIN-5T344G8GM1H$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13943 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 872 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:48 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 13942 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 872 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:48 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		WIN-5T344G8GM1H$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13941 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 872 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:48 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The system time was changed.
Subject:
	Security ID:		S-1-5-19
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E5
Process Information:
	Process ID:	0x528
	Name:		C:\Windows\System32\svchost.exe
Previous Time:		?2022?-?03?-?10T08:01:47.841788600Z
New Time:		?2022?-?03?-?10T08:01:48.309000000Z
This event is generated when the system time is changed. It is normal for the Windows Time Service, which runs with System privilege, to change the system time on a regular basis. Other system time changes may be indicative of attempts to tamper with the computer. | 4616 | 1 |  | 0 | 12288 | 0 | -9214364837600034816 | 13940 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 468 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:48 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security State Change | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 13939 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 864 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:47 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		WIN-5T344G8GM1H$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13938 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 864 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:47 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 13937 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 864 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:47 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		WIN-5T344G8GM1H$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13936 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 864 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:47 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 13935 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:39 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		WIN-5T344G8GM1H$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13934 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:39 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 13933 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:39 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		WIN-5T344G8GM1H$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13932 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:39 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-19
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E5
Privileges:		SeAssignPrimaryTokenPrivilege
			SeAuditPrivilege
			SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 13931 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:39 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		WIN-5T344G8GM1H$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-19
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E5
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13930 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:39 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-90-0-1
	Account Name:		DWM-1
	Account Domain:		Window Manager
	Logon ID:		0x57559
Privileges:		SeAssignPrimaryTokenPrivilege
			SeAuditPrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 13929 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:39 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-90-0-1
	Account Name:		DWM-1
	Account Domain:		Window Manager
	Logon ID:		0x57547
Privileges:		SeAssignPrimaryTokenPrivilege
			SeAuditPrivilege
			SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 13928 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:39 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		WIN-5T344G8GM1H$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		2
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		No
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-90-0-1
	Account Name:		DWM-1
	Account Domain:		Window Manager
	Logon ID:		0x57559
	Linked Logon ID:		0x57547
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x2e4
	Process Name:		C:\Windows\System32\winlogon.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13927 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:39 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		WIN-5T344G8GM1H$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		2
	Restricted Admin Mode:	-
	Virtual Account:		Yes
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-90-0-1
	Account Name:		DWM-1
	Account Domain:		Window Manager
	Logon ID:		0x57547
	Linked Logon ID:		0x57559
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x2e4
	Process Name:		C:\Windows\System32\winlogon.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13926 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:39 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A logon was attempted using explicit credentials.
Subject:
	Security ID:		S-1-5-18
	Account Name:		WIN-5T344G8GM1H$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
	Account Name:		DWM-1
	Account Domain:		Window Manager
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost
Process Information:
	Process ID:		0x2e4
	Process Name:		C:\Windows\System32\winlogon.exe
Network Information:
	Network Address:	-
	Port:			-
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. | 4648 | 0 |  | 0 | 12544 | 0 | -9214364837600034816 | 13925 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:39 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 13924 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:39 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		WIN-5T344G8GM1H$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13923 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:39 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-20
	Account Name:		NETWORK SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E4
Privileges:		SeAssignPrimaryTokenPrivilege
			SeAuditPrivilege
			SeImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 13922 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:38 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		WIN-5T344G8GM1H$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-20
	Account Name:		NETWORK SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E4
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13921 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 916 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:38 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 13920 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 864 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:37 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		WIN-5T344G8GM1H$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x32c
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13919 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 864 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:37 AM | 033e9681-3455-0005-8596-3e035534d801 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The Per-user audit policy table was created.
Number of Elements:	0
Policy ID:	0x4FFDB | 4902 | 0 |  | 0 | 13568 | 0 | -9214364837600034816 | 13918 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 876 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:37 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Audit Policy Change | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Logon Information:
	Logon Type:		0
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		-
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x4
	Process Name:		
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		-
	Authentication Package:	-
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13917 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 832 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:37 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Windows is starting up.
This event is logged when LSASS.EXE starts and the auditing subsystem is initialized. | 4608 | 0 |  | 0 | 12288 | 0 | -9214364837600034816 | 13916 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 828 | 832 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:37 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security State Change | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x33c
	New Process Name:	C:\Windows\System32\lsass.exe
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x2bc
	Creator Process Name:	C:\Windows\System32\wininit.exe
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 13915 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 136 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:36 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x32c
	New Process Name:	C:\Windows\System32\services.exe
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x2bc
	Creator Process Name:	C:\Windows\System32\wininit.exe
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 13914 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 136 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:36 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x2e4
	New Process Name:	C:\Windows\System32\winlogon.exe
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x29c
	Creator Process Name:	C:\Windows\System32\smss.exe
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 13913 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 136 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:36 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x2bc
	New Process Name:	C:\Windows\System32\wininit.exe
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x258
	Creator Process Name:	C:\Windows\System32\smss.exe
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 13912 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 584 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:36 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x2a4
	New Process Name:	C:\Windows\System32\csrss.exe
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x29c
	Creator Process Name:	C:\Windows\System32\smss.exe
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 13911 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 584 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:36 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x29c
	New Process Name:	C:\Windows\System32\smss.exe
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x1e4
	Creator Process Name:	C:\Windows\System32\smss.exe
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 13910 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 584 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:35 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x264
	New Process Name:	C:\Windows\System32\csrss.exe
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x258
	Creator Process Name:	C:\Windows\System32\smss.exe
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 13909 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 188 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:35 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x258
	New Process Name:	C:\Windows\System32\smss.exe
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x1e4
	Creator Process Name:	C:\Windows\System32\smss.exe
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 13908 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 188 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:35 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x238
	New Process Name:	C:\Windows\System32\setupcl.exe
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x1e4
	Creator Process Name:	C:\Windows\System32\smss.exe
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 13907 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 136 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:18 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x208
	New Process Name:	C:\Windows\System32\autochk.exe
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x1e4
	Creator Process Name:	C:\Windows\System32\smss.exe
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 13906 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 228 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:16 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x1e4
	New Process Name:	C:\Windows\System32\smss.exe
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x4
	Creator Process Name:	
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 13905 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 136 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:15 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A new process has been created.
Creator Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
Target Subject:
	Security ID:		S-1-0-0
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0
Process Information:
	New Process ID:		0x1e0
	New Process Name:	
	Token Elevation Type:	%%1936
	Mandatory Label:		S-1-16-16384
	Creator Process ID:	0x4
	Creator Process Name:	
	Process Command Line:	
Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.
Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator. | 4688 | 2 |  | 0 | 13312 | 0 | -9214364837600034816 | 13904 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 136 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:15 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Process Creation | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Boot Configuration Data loaded.
Subject:
	Security ID:		S-1-5-18
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x3E7
General Settings:
	Load Options:		-
	Advanced Options:		No
	Configuration Access Policy:	Default
	System Event Logging:	No
	Kernel Debugging:	No
	VSM Launch Type:	Auto
Signature Settings:
	Test Signing:		No
	Flight Signing:		No
	Disable Integrity Checks:	No
HyperVisor Settings:
	HyperVisor Load Options:	-
	HyperVisor Launch Type:	Auto
	HyperVisor Debugging:	No | 4826 | 0 |  | 0 | 13573 | 0 | -9214364837600034816 | 13903 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 136 | WIN-5T344G8GM1H |  | 3/10/2022 8:01:15 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Other Policy Change Events | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The system time was changed.
Subject:
	Security ID:		S-1-5-19
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E5
Process Information:
	Process ID:	0x4dc
	Name:		C:\Windows\System32\svchost.exe
Previous Time:		?2018?-?01?-?19T09:48:13.164762500Z
New Time:		?2018?-?01?-?19T09:48:13.152000000Z
This event is generated when the system time is changed. It is normal for the Windows Time Service, which runs with System privilege, to change the system time on a regular basis. Other system time changes may be indicative of attempts to tamper with the computer. | 4616 | 1 |  | 0 | 12288 | 0 | -9214364837600034816 | 13902 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 4 | 1980 | WIN-5T344G8GM1H |  | 1/19/2018 9:48:13 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Security State Change | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The event logging service has shut down. | 1100 | 0 |  | 4 | 103 | 0 | 4620693217682128896 | 13901 | Microsoft-Windows-Eventlog | fc65ddd8-d6ef-4962-83d5-6e5cfe9ce148 | Security | 436 | 1144 | WIN-5T344G8GM1H |  | 1/19/2018 9:48:13 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Service shutdown | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| User initiated logoff:
Subject:
	Security ID:		S-1-5-21-416071247-492812682-1642729393-500
	Account Name:		Administrator
	Account Domain:		WIN-5T344G8GM1H
	Logon ID:		0x1F0E3
This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event. | 4647 | 0 |  | 0 | 12545 | 0 | -9214364837600034816 | 13900 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 664 | 716 | WIN-5T344G8GM1H |  | 1/19/2018 9:48:12 AM | ad8d0f9c-9109-0000-b10f-8dad0991d301 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logoff | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 13899 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 664 | 3024 | WIN-5T344G8GM1H |  | 1/19/2018 9:48:11 AM | ad8d0f9c-9109-0000-b10f-8dad0991d301 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		WIN-5T344G8GM1H$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x290
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13898 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 664 | 3024 | WIN-5T344G8GM1H |  | 1/19/2018 9:48:11 AM | ad8d0f9c-9109-0000-b10f-8dad0991d301 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 13897 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 664 | 756 | WIN-5T344G8GM1H |  | 1/19/2018 9:48:10 AM | ad8d0f9c-9109-0000-b10f-8dad0991d301 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		WIN-5T344G8GM1H$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x290
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13896 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 664 | 756 | WIN-5T344G8GM1H |  | 1/19/2018 9:48:10 AM | ad8d0f9c-9109-0000-b10f-8dad0991d301 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Domain Policy was changed.
Change Type:		Password Policy modified
Subject:
	Security ID:		S-1-5-21-416071247-492812682-1642729393-500
	Account Name:		Administrator
	Account Domain:		WIN-5T344G8GM1H
	Logon ID:		0x1F0E3
Domain:
	Domain Name:		WIN-5T344G8GM1H
	Domain ID:		S-1-5-21-416071247-492812682-1642729393
Changed Attributes:
	Min. Password Age:	
	Max. Password Age:	
	Force Logoff:		
	Lockout Threshold:	
	Lockout Observation Window:	
	Lockout Duration:	
	Password Properties:	
	Min. Password Length:	
	Password History Length:	-
	Machine Account Quota:	-
	Mixed Domain Mode:	-
	Domain Behavior Version:	-
	OEM Information:	1
Additional Information:
	Privileges:		- | 4739 | 0 |  | 0 | 13569 | 0 | -9214364837600034816 | 13895 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 664 | 716 | WIN-5T344G8GM1H |  | 1/19/2018 9:47:34 AM | ad8d0f9c-9109-0000-b10f-8dad0991d301 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Authentication Policy Change | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A user account was changed.
Subject:
	Security ID:		S-1-5-21-416071247-492812682-1642729393-500
	Account Name:		Administrator
	Account Domain:		WIN-5T344G8GM1H
	Logon ID:		0x1F0E3
Target Account:
	Security ID:		S-1-5-21-416071247-492812682-1642729393-500
	Account Name:		Administrator
	Account Domain:		WIN-5T344G8GM1H
Changed Attributes:
	SAM Account Name:	Administrator
	Display Name:		<value not set>
	User Principal Name:	-
	Home Directory:		<value not set>
	Home Drive:		<value not set>
	Script Path:		<value not set>
	Profile Path:		<value not set>
	User Workstations:	<value not set>
	Password Last Set:	<never>
	Account Expires:		<never>
	Primary Group ID:	513
	AllowedToDelegateTo:	-
	Old UAC Value:		0x210
	New UAC Value:		0x10
	User Account Control:	
		'Don't Expire Password' - Disabled
	User Parameters:	<value not set>
	SID History:		-
	Logon Hours:		All
Additional Information:
	Privileges:		- | 4738 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 13894 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 664 | 716 | WIN-5T344G8GM1H |  | 1/19/2018 9:47:34 AM | ad8d0f9c-9109-0000-b10f-8dad0991d301 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An attempt was made to reset an account's password.
Subject:
	Security ID:		S-1-5-21-416071247-492812682-1642729393-500
	Account Name:		Administrator
	Account Domain:		WIN-5T344G8GM1H
	Logon ID:		0x1F0E3
Target Account:
	Security ID:		S-1-5-21-416071247-492812682-1642729393-500
	Account Name:		Administrator
	Account Domain:		WIN-5T344G8GM1H | 4724 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 13893 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 664 | 716 | WIN-5T344G8GM1H |  | 1/19/2018 9:47:34 AM | ad8d0f9c-9109-0000-b10f-8dad0991d301 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A user account was changed.
Subject:
	Security ID:		S-1-5-21-416071247-492812682-1642729393-500
	Account Name:		Administrator
	Account Domain:		WIN-5T344G8GM1H
	Logon ID:		0x1F0E3
Target Account:
	Security ID:		S-1-5-21-416071247-492812682-1642729393-500
	Account Name:		Administrator
	Account Domain:		WIN-5T344G8GM1H
Changed Attributes:
	SAM Account Name:	Administrator
	Display Name:		<value not set>
	User Principal Name:	-
	Home Directory:		<value not set>
	Home Drive:		<value not set>
	Script Path:		<value not set>
	Profile Path:		<value not set>
	User Workstations:	<value not set>
	Password Last Set:	1/19/2018 9:47:34 AM
	Account Expires:		<never>
	Primary Group ID:	513
	AllowedToDelegateTo:	-
	Old UAC Value:		0x210
	New UAC Value:		0x210
	User Account Control:	-
	User Parameters:	-
	SID History:		-
	Logon Hours:		All
Additional Information:
	Privileges:		- | 4738 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 13892 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 664 | 716 | WIN-5T344G8GM1H |  | 1/19/2018 9:47:34 AM | ad8d0f9c-9109-0000-b10f-8dad0991d301 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Domain Policy was changed.
Change Type:		Password Policy modified
Subject:
	Security ID:		S-1-5-21-416071247-492812682-1642729393-500
	Account Name:		Administrator
	Account Domain:		WIN-5T344G8GM1H
	Logon ID:		0x1F0E3
Domain:
	Domain Name:		WIN-5T344G8GM1H
	Domain ID:		S-1-5-21-416071247-492812682-1642729393
Changed Attributes:
	Min. Password Age:	??
	Max. Password Age:	
	Force Logoff:		??
	Lockout Threshold:	
	Lockout Observation Window:	-
	Lockout Duration:	-
	Password Properties:	-
	Min. Password Length:	-
	Password History Length:	0
	Machine Account Quota:	0
	Mixed Domain Mode:	0
	Domain Behavior Version:	-
	OEM Information:	-
Additional Information:
	Privileges:		- | 4739 | 0 |  | 0 | 13569 | 0 | -9214364837600034816 | 13891 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 664 | 716 | WIN-5T344G8GM1H |  | 1/19/2018 9:47:34 AM | ad8d0f9c-9109-0000-b10f-8dad0991d301 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Authentication Policy Change | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| A user's local group membership was enumerated.
Subject:
	Security ID:		S-1-5-21-416071247-492812682-1642729393-500
	Account Name:		Administrator
	Account Domain:		WIN-5T344G8GM1H
	Logon ID:		0x1F0E3
User:
	Security ID:		S-1-5-21-416071247-492812682-1642729393-500
	Account Name:		Administrator
	Account Domain:		WIN-5T344G8GM1H
Process Information:
	Process ID:		0xfac
	Process Name:		C:\Windows\System32\Sysprep\sysprep.exe | 4798 | 0 |  | 0 | 13824 | 0 | -9214364837600034816 | 13890 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 664 | 716 | WIN-5T344G8GM1H |  | 1/19/2018 9:47:34 AM | ad8d0f9c-9109-0000-b10f-8dad0991d301 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | User Account Management | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| Special privileges assigned to new logon.
Subject:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege
			SeDelegateSessionUserImpersonatePrivilege | 4672 | 0 |  | 0 | 12548 | 0 | -9214364837600034816 | 13889 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 664 | 716 | WIN-5T344G8GM1H |  | 1/19/2018 9:47:33 AM | ad8d0f9c-9109-0000-b10f-8dad0991d301 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Special Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| An account was successfully logged on.
Subject:
	Security ID:		S-1-5-18
	Account Name:		WIN-5T344G8GM1H$
	Account Domain:		WORKGROUP
	Logon ID:		0x3E7
Logon Information:
	Logon Type:		5
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes
Impersonation Level:		Impersonation
New Logon:
	Security ID:		S-1-5-18
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3E7
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}
Process Information:
	Process ID:		0x290
	Process Name:		C:\Windows\System32\services.exe
Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-
Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested. | 4624 | 2 |  | 0 | 12544 | 0 | -9214364837600034816 | 13888 | Microsoft-Windows-Security-Auditing | 54849625-5478-4994-a5ba-3e3b0328c30d | Security | 664 | 716 | WIN-5T344G8GM1H |  | 1/19/2018 9:47:33 AM | ad8d0f9c-9109-0000-b10f-8dad0991d301 |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Logon | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] | 
| The audit log was cleared.
Subject:
	Security ID:	S-1-5-21-416071247-492812682-1642729393-500
	Account Name:	Administrator
	Domain Name:	WIN-5T344G8GM1H
	Logon ID:	0x1F0E3 | 1102 | 0 |  | 4 | 104 | 0 | 4620693217682128896 | 13887 | Microsoft-Windows-Eventlog | fc65ddd8-d6ef-4962-83d5-6e5cfe9ce148 | Security | 436 | 1136 | WIN-5T344G8GM1H |  | 1/19/2018 9:47:33 AM |  |  | security | System.UInt32[] | System.Diagnostics.Eventing.Reader.EventBookmark | Information | Info | Log clear | System.Collections.ObjectModel.ReadOnlyCollection`1[System.String] | System.Collections.Generic.List`1[System.Diagnostics.Eventing.Reader.EventProperty] |