πŸ”
Windows Forensic Handbook
Ctrlk
  • πŸ‘‹Welcome
  • Artifacts by Type
    • πŸ—„οΈRegistry Artifacts
    • πŸ“‚Filesystem Artifacts
    • πŸ“…Event Log Artifacts
  • Artifacts by Activity
    • πŸƒβ€β™‚οΈExecution
      • Evidence of Execution
      • First Executed
        • Prefetch
        • AutomaticDestinations Jumplists
        • Task Scheduler Files
        • Tracing Registry Keys
        • Task Scheduler Operational Log
        • EventID 4104: PowerShell Script Block Logging
      • Last Executed
      • Command Line Options
      • Execution Account
      • Parent and Child Information
      • Execution Timestamp
    • πŸ—’οΈFile Activity
    • πŸ‘¨β€πŸ”§Account Activity
    • 🌎Network Activity
    • πŸ”Browser Activity
    • πŸ–₯️System Enumeration
Powered by GitBook
On this page
  1. Artifacts by Activity
  2. πŸƒβ€β™‚οΈExecution

First Executed

PrefetchAutomaticDestinations JumplistsTask Scheduler FilesTracing Registry KeysTask Scheduler Operational LogEventID 4104: PowerShell Script Block Logging

Last updated 1 year ago