🔍
Windows Forensic Handbook
Ctrlk
  • 👋Welcome
  • Artifacts by Type
    • 🗄️Registry Artifacts
    • 📂Filesystem Artifacts
    • 📅Event Log Artifacts
  • Artifacts by Activity
    • 🏃‍♂️Execution
      • Evidence of Execution
        • Prefetch
        • Amcache.hve
        • System Resource Usage Monitor (SRUM)
        • Background Activity Montitor
        • AutomaticDestinations Jumplists
        • Task Scheduler Files
        • Task Scheduler Operational Log
        • Windows Error Reporting Files (.WER)
        • Tracing Registry Keys
        • EventID 4688: A new process has been created
        • EventID 2004: Firewall Rule Added
        • EventID 2005: Firewall Rule Modified
        • EventID 2006: Firewall Rule Deleted
        • EventID 2071: Firewall Rule Added
        • EventID 2073: Firewall Rule Modified
        • EventID 2052: Firewall Rule Deleted
        • EventID 9707: Command Execution Started
        • EventID 4104: PowerShell Script Block Logging
      • First Executed
      • Last Executed
      • Command Line Options
      • Execution Account
      • Parent and Child Information
      • Execution Timestamp
    • 🗒️File Activity
    • 👨‍🔧Account Activity
    • 🌎Network Activity
    • 🔍Browser Activity
    • 🖥️System Enumeration
Powered by GitBook
On this page
  1. Artifacts by Activity
  2. 🏃‍♂️Execution

Evidence of Execution

PrefetchAmcache.hveSystem Resource Usage Monitor (SRUM)Background Activity MontitorAutomaticDestinations JumplistsTask Scheduler FilesTask Scheduler Operational LogWindows Error Reporting Files (.WER)Tracing Registry KeysEventID 4688: A new process has been createdEventID 2004: Firewall Rule AddedEventID 2005: Firewall Rule ModifiedEventID 2006: Firewall Rule DeletedEventID 2071: Firewall Rule AddedEventID 2073: Firewall Rule ModifiedEventID 2052: Firewall Rule DeletedEventID 9707: Command Execution StartedEventID 4104: PowerShell Script Block Logging

Last updated 1 year ago