EventID 4688: A new process has been created

This event, logged to the Security channel, indicates a process was created on the system.

circle-exclamation

Analysis Value

Logon IDchevron-rightSecurity Identifierchevron-rightCommand Line Optionschevron-rightExecution Accountchevron-rightParent and Child Informationchevron-rightEvidence of Executionchevron-rightExecution Timestampchevron-right

Operating System Availability

Major Version
Support
Major Version
Support

Windows 11

โš ๏ธ

Server 2019

โš ๏ธ

Windows 10

โš ๏ธ

Server 2016

โš ๏ธ

Windows 8

โš ๏ธ

Server 2012

โš ๏ธ

Windows 7

โš ๏ธ

Server 2008

โš ๏ธ

Windows Vista

โš ๏ธ

Server 2003

โš ๏ธ

Windows XP

โš ๏ธ

circle-exclamation
circle-exclamation

Artifact Location(s)

  • %SystemRoot%\System32\Winevt\Logs\Security.evtx

Artifact Interpretation

Field
Interpretation
Reference

EventData/SubjectLogonId

Provides the LogonID of the account that spawned the new process

EventData/NewProcessName

Provides the full path of the application that was spawned

EventData/CommandLine

The command line that spawned the new process

EventData/SubjectUserSid

The SID of the account that spawned the process

EventData/SubjectUserName

The username of the account that spawned the new process

EventData/SubjectDomainName

The domain name of the account that spawned the new process, if it exists. If the user is not a domain user, this field will be -

EventData/TokenElevationType

The token elevation type, related to UAC (see Analysis Tips)

EventData/NewProcessID

The process ID of the newly spawned process

EventData/ProcessID

The process ID of the parent process

Analysis Tips

circle-check

TokenElevationType and UAC

circle-exclamation
circle-check

Command Line Options

circle-check

Process Tree

Examples

In the following example, notepad.exe was launched by a user through Explorer.

This example was produced on Windows 10, Version 10.0.19044 Build 19044

In the following example, regedit.exe was launched by a user through the command line. Note the TokenElevationType has a value of %%1937, indicating they were likely prompted for administrative credentials/permissions. This also causes the user information to be stored in the Target fields, as opposed to the Subject fields as seen in the previous example.

This example was produced on Windows 10, Version 10.0.19044 Build 19044

Last updated