Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/Psmths/windows-forensic-artifacts

Handbook of windows forensic artifacts across multiple Windows version with interpretation tips with some examples. Work in progress!
https://github.com/Psmths/windows-forensic-artifacts

analysis artifacts dfir digital-forensics forensic-analysis forensicartifacts forensics forensics-investigations reference windows windows-11

Last synced: about 2 months ago
JSON representation

Handbook of windows forensic artifacts across multiple Windows version with interpretation tips with some examples. Work in progress!

Awesome Lists containing this project

README

        


![Windows Forensic Artifacts Guide](/media/title-2.png)





This repository provides an in-depth guide to the various Windows forensic artifacts that can be utilized when conducting an investigation. Detailed information is provided for each artifact, including its location, available parsing tools, and instructions for interpreting the results of a forensic data extraction. Furthermore, the repository seeks to provide a comprehensive resource for those seeking to expand their understanding of Windows forensics artifacts and how to properly leverage them during a forensic investigation.

# Contents
- [Types of Windows Artifacts](#types-of-windows-artifacts)
- [How to Use this Guide](#how-to-use-this-guide)
- [Artifacts by Category](#artifacts-by-category)
* [Execution](#execution)
- [Command Line Options](#execution---command-line-options)
- [First Executed](#execution---first-executed)
- [Last Executed](#execution---last-executed)
- [Permissions/Account](#execution---permissions--account)
- [Process Geneaology/Tree](#execution---process-tree)
- [Execution Time](#execution---time)
- [Evidence of Execution](#execution---evidence-of-execution)
* [Account Activity](#account-activity)
- [Account Creation Time](#account---creation-time)
- [Group Membership](#account---group-membership)
- [Last Login](#account---last-login)
- [Login History](#account---login-history)
- [Logon ID](#account---logon-id)
- [Relative Identifier (RID)](#account---relative-identifier-rid)
- [Security Identifier (SID)](#account---security-identifier-sid)
- [Username](#account---username)
* [File Activity](#file-activity)
- [Creation](#file---creation)
- [Deletion](#file---deletion)
- [Hash](#file---hash)
- [Last Modified](#file---last-modified)
- [Origin](#file---origin)
- [Path](#file---path)
- [Size](#file---size)
* [Network Activity](#network-activity)
- [Evidence of Network Activity](#network-activity---evidence-of-network-activity)
- [Destination Identification](#network-activity---destination-identification)
- [Source Identification](#network-activity---source-identification)
- [Transmit Volume](#network-activity---transmit-volume)
- [Browser Activity](#network-activity---browser-activity)
- [Firewall Activity](#network-activity---firewall-activity)
- [Wireless Activity](#network-activity---wireless-activity)
* [Browser Activity](#browser-activity)
- [History](#browser-activity---history)
- [Bookmarks](#browser-activity---bookmarks)
* [User Activity](#user-activity)
* [Group Policy Activity](#group-policy-activity)
- [System Enumeration Artifacts](#enumeration-artifacts)
- [Artifact Behavioral Mappings](#artifact-behavioral-mappings)
* [TA0002 - Execution](#ta0002-execution)
* [TA0003 - Persistence](#ta0003-persistence)
* [TA0008 - Lateral Movement](#ta0008-lateral-movement)

(back to top)

# Types of Windows Artifacts
Forensic artifacts on the Windows operatying system can generally be split into four main categories:

1. Registry
2. Filesystem
3. Event Log
4. Memory

**Registry** artifacts are found in the Windows registry, which is loaded into memory while a system is in operation and written to disk during shutdown. The registry stores low-level configuration settings for the operating system and contains a wealth of forensic artifacts of interest to an analyst.

**Filesystem** artifacts are artifacts that arise due to the operation of Windows' filesystem - NTFS (New Technology File System).

**Event log** artifacts are found in the Windows event log and consist primarily of audit logs from the operating system and its applications.

**Memory** artifacts are those artifacts found in the endpoint's memory while it is operational. These artifacts must be collected from a live system, and are generally not applicable to dead disk forensics with certain exceptions such as page files and hibernation files that consist of memory that has been written to the disk.

A complete forensic analysis of a Windows endpoint will consist of one or all of these artifacts. They may be collected and parsed individually at the analyst's discretion, or consolidated into "super timelines" with forensic software such as [log2timeline](https://github.com/log2timeline).

(back to top)

# How to Use this Guide

This guide was created to classify the numerous Windows forensic artifacts and provide a concise list of what information they respectively provide. While it may be used as a general reference, it shines when it comes time to tie separate artifacts together based on mutual/shared datapoints.

For instance, if it is known that an attacker has logged into an endpoint around a certain time, an analyst may want to determine what activity on the endpoint can be attributed to this session. For this, the analyst might begin by looking at 4624 Login events and pull the `Logon ID` from this artifact. This guide provides a list of every artifact that has the `Logon ID` field present, providing a quick way to correlate logon activity with other activity on the endpoint filed under the section [Logon ID](#account---logon-id).

As another example, say for instance you are aware that an endpoint may have a malicious file on it. Maybe you want to see [when the file was created](#file---creation), or [when it was first executed](#execution---first-executed). What about determining [what Logon ID is associated with the execution with 4688 events?](#account---logon-id)

Building a visual map in your mind of the relationships between all the artifacts present in Windows is necessary to allow for an analyst to efficiently pivot their focus during an investigation, this guide simply lays it all out and provides useful analysis tips collected during years of forensic experience while doing so.

(back to top)

# Artifacts by Category

The forensic artifacts described in this repository are split into the following categories:

- [Execution](#execution)
- [Account Activity](#account-activity)
- [File Activity](#file-activity)
- [Network Activity](#network-activity)

## Execution
Execution artifacts may provide the following information:

### Execution - Command Line Options
>What command line was used to spawn this process?

- [Security/4688: A new process has been created](execution/evtx-4688-process-created.md)
- [Scheduled Task Files](persistence/task-scheduler-files.md)
- [TaskScheduler/Operational Log](persistence/task-scheduler-operational-log.md)
- [Detection History Files](file-activity/detectionhistory.md)
- [Microsoft-Windows-Shell-Core/Operational/9707: Command Execution Started](execution/evtx-9707-shell-core.md)
- [winget Activity](/user-activity/winget.md)

### Execution - First Executed
>When was this executable furst run?
- [Prefetch](execution/prefetch.md)
- [AmCache.hve](execution/amcache.md)
- [Scheduled Task Files](persistence/task-scheduler-files.md)
- [TaskScheduler/Operational Log](persistence/task-scheduler-operational-log.md)
- [Microsoft-Windows-PowerShell/Operational/4104: PowerShell Script Block Logging](execution/evtx-4104-script-block-logging.md)
- [AutomaticDestinations Jumplists](file-activity/automatic-destinations.md)

### Execution - Last Executed
>When was the last time this executable was run?
- [Prefetch](execution/prefetch.md)
- [Scheduled Task Files](persistence/task-scheduler-files.md)
- [TaskScheduler/Operational Log](persistence/task-scheduler-operational-log.md)
- [Background Activity Montitor](execution/bam-dam.md)
- [Program Compatibility Assistant (PCA) - PcaAppLaunchDic.txt](execution/program-compatibility-assistant.md)
- [AutomaticDestinations Jumplists](file-activity/automatic-destinations.md)

### Execution - Permissions / Account
>What permissions does the process have?
>What account launced the process?
- [Security/4688: A new process has been created](execution/evtx-4688-process-created.md)
- [Scheduled Task Files](persistence/task-scheduler-files.md)
- [Background Activity Montitor](execution/bam-dam.md)
- [SRUM Database](execution/srum-db.md)
- [Microsoft-Windows-Shell-Core/Operational/9707: Command Execution Started](execution/evtx-9707-shell-core.md)
- [AutomaticDestinations Jumplists](file-activity/automatic-destinations.md)

### Execution - Process Tree
>How did this process come to be? What spawned this process? Is the ProcessID available?
- [Security/4688: A new process has been created](execution/evtx-4688-process-created.md)
- [Microsoft-Windows-PowerShell/Operational/4104: PowerShell Script Block Logging](execution/evtx-4104-script-block-logging.md)
- [TerminalServices-RDPClient/Operational/1024: RDP ClientActiveX is trying to connect to the server](network/evtx-1024-rdp-activex.md)
- [Microsoft-Windows-Shell-Core/Operational/9707: Command Execution Started](execution/evtx-9707-shell-core.md)

### Execution - Time
>When was this process spawned?
- [Security/4688: A new process has been created](execution/evtx-4688-process-created.md)
- [Scheduled Task Files](persistence/task-scheduler-files.md)
- [TaskScheduler/Operational Log](persistence/task-scheduler-operational-log.md)
- [Microsoft-Windows-Shell-Core/Operational/9707: Command Execution Started](execution/evtx-9707-shell-core.md)

### Execution - Evidence of Execution
>Was a process spawned?
- [AmCache.hve](execution/amcache.md)
- [Background Activity Montitor](execution/bam-dam.md)
- [Security/4688: A new process has been created](execution/evtx-4688-process-created.md)
- [Prefetch](execution/prefetch.md)
- [ShimCache](execution/shimcache.md)
- [SRUM Database](execution/srum-db.md)
- [Detection History Files](file-activity/detectionhistory.md)
- [Scheduled Task Files](persistence/task-scheduler-files.md)
- [TaskScheduler/Operational Log](persistence/task-scheduler-operational-log.md)
- [Program Compatibility Assistant (PCA) - PcaAppLaunchDic.txt](execution/program-compatibility-assistant.md)
- [Tracing Registry Keys](network/tracing-keys.md)
- [Microsoft-Windows-Shell-Core/Operational/9707: Command Execution Started](execution/evtx-9707-shell-core.md)
- [Security/5156: The Windows Filtering Platform has permitted a connection](network/evtx-5156-wfp-permitted.md)
- [AutomaticDestinations Jumplists](file-activity/automatic-destinations.md)
- [Windows Error Reporting Files (.WER)](execution/wer-files.md)

(back to top)

## Account Activity
Account activity artifacts may provide the following information:
### Account - Creation Time
> When was this account created?
- [SAM Hive](account/sam-hive.md)
- [Security/4720: A user account was created](account/evtx-4720-account-created.md)

### Account - Group Membership
> What groups is the account a member of?
- [SAM Hive](account/sam-hive.md)
- [Group Membership Registry Key](account/group-membership-key.md)

### Account - Last Login
> When did this account last log in?
- [SAM Hive](account/sam-hive.md)

### Account - Login History
> Identification of specific instances of account logins
- [Security/4778: Session reconnected](network/evtx-4778-session-reconnected.md)
- [Security/4648: Logon using explicit credentials](account/evtx-4648-explicit-credentials.md)
- [Security/4624: An account was successfully logged on](account/evtx-4624-successful-logon.md)
- [Security/4625: An account failed to log on](account/evtx-4625-failed-logon.md)

### Account - Logon ID
> Certain activity can be tied to login sessions by means of a `Logon ID`
- [Security/4688: A new process has been created](execution/evtx-4688-process-created.md)
- [Security/4720: A user account was created](account/evtx-4720-account-created.md)
- [Security/4778: Session reconnected](network/evtx-4778-session-reconnected.md)
- [Security/4648: Logon using explicit credentials](account/evtx-4648-explicit-credentials.md)
- [Security/4624: An account was successfully logged on](account/evtx-4624-successful-logon.md)

### Account - Relative Identifier (RID)
> What is the account's [Relative Identifier](https://en.wikipedia.org/wiki/Relative_identifier)?
- [SAM Hive](account/sam-hive.md)

### Account - Security Identifier (SID)
> What is the account's [Security Identifier](https://en.wikipedia.org/wiki/Security_Identifier)?
- [SAM Hive](account/sam-hive.md)
- [Security/4720: A user account was created](account/evtx-4720-account-created.md)
- [Security/4778: Session reconnected](network/evtx-4778-session-reconnected.md)
- [TerminalServices-RDPClient/Operational/1024: RDP ClientActiveX is trying to connect to the server](network/evtx-1024-rdp-activex.md)
- [Security/4648: Logon using explicit credentials](account/evtx-4648-explicit-credentials.md)
- [Security/4624: An account was successfully logged on](account/evtx-4624-successful-logon.md)
- [Security/4625: An account failed to log on](account/evtx-4625-failed-logon.md)
- [WMI-Activity/Operational/5861: New WMI Event Consumer](persistence/evtx-5861-event-consumer-created.md)
- [SRUM Database](execution/srum-db.md)
- [ProfileList](account/profile-list-key.md)
- [Microsoft-Windows-PowerShell/Operational/4104: PowerShell Script Block Logging](execution/evtx-4104-script-block-logging.md)
- [Recycle Bin $I/$R Files](file-activity/recycle-bin-files.md)
- [Background Activity Montitor](execution/bam-dam.md)
- [Microsoft-Windows-Shell-Core/Operational/9707: Command Execution Started](execution/evtx-9707-shell-core.md)
- [Security/7045: Service Installed](persistence/evtx-7045-service-install.md)

### Account - Username
> Determining the username attached to a particular SID, or artifacts where you would expect to find a username
- [ProfileList](account/profile-list-key.md)
- [AutomaticDestinations Jumplists](file-activity/automatic-destinations.md)
- [Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational/1149](network/terminal-services-remote-1149.md)
- [Microsoft-Windows-TerminalServices-LocalSessionManager/Operational/21: Session logon succeeded](network/terminal-services-local-21.md)
- [Microsoft-Windows-TerminalServices-LocalSessionManager/Operational/24: Session has been disconnected](network/terminal-services-local-24.md)

(back to top)

## File Activity
File activity artifacts may provide the following information:

### File - Creation
> When was the file created?
- [Zone.Identifier](file-activity/zone-identifier.md)
- [USN Journal](file-activity/usn-journal.md)

### File - Deletion
> When was the file deleted?
- [USN Journal](file-activity/usn-journal.md)
- [Recycle Bin $I/$R Files](file-activity/recycle-bin-files.md)

### File - Hash
> What is the hash of this file?
- [AmCache.hve](execution/amcache.md)
- [Detection History Files](file-activity/detectionhistory.md)

### File - Last Modified
> When was the file last modified?
- [ShimCache](execution/shimcache.md)
- [USN Journal](file-activity/usn-journal.md)

### File - Origin
> Where did the file come from?
- [Zone.Identifier](file-activity/zone-identifier.md)

### File - Path
> Where is the file located?
- [ShimCache](execution/shimcache.md)
- [AmCache.hve](execution/amcache.md)
- [Run/RunOnce Keys](persistence/reg-run-runonce.md)
- [USN Journal](file-activity/usn-journal.md)
- [Scheduled Task Files](persistence/task-scheduler-files.md)
- [TaskScheduler/Operational Log](persistence/task-scheduler-operational-log.md)
- [Background Activity Montitor](execution/bam-dam.md)
- [SRUM Database](execution/srum-db.md)
- [Detection History Files](file-activity/detectionhistory.md)
- [Image File Execution Options](persistence/image-file-execution-options.md)
- [Program Compatibility Assistant (PCA) - PcaAppLaunchDic.txt](execution/program-compatibility-assistant.md)
- [Microsoft-Windows-PowerShell/Operational/4104: PowerShell Script Block Logging](execution/evtx-4104-script-block-logging.md)
- [Recycle Bin $I/$R Files](file-activity/recycle-bin-files.md)
- [Services Registry Keys](persistence/registry-services.md)
- [Security/7045: Service Installed](persistence/evtx-7045-service-install.md)
- [Security/5156: The Windows Filtering Platform has permitted a connection](network/evtx-5156-wfp-permitted.md)
- [AutomaticDestinations Jumplists](file-activity/automatic-destinations.md)
- [Windows Error Reporting Files (.WER)](execution/wer-files.md)
- [Microsoft Office TrustRecords Registry Keys](/file-activity/trustrecords-registry-key.md)

### File - Size
> What is the file's size on disk?
- [ShimCache](execution/shimcache.md)
- [USN Journal](file-activity/usn-journal.md)
- [Recycle Bin $I/$R Files](file-activity/recycle-bin-files.md)

(back to top)

## Network Activity
Network activity artifacts may provide the following information:

### Network Activity - Evidence of Network Activity
> Is there evidence of network activity?
- [TerminalServices-RDPClient/Operational/1024: RDP ClientActiveX is trying to connect to the server](network/evtx-1024-rdp-activex.md)
- [Tracing Registry Keys](network/tracing-keys.md)
- [Microsoft-Windows-WLAN-AutoConfig/Operational/8001: Successfully Connected to a Wireless Network](network/evtx-8001-wlan-connect.md)
- [Microsoft-Windows-WLAN-AutoConfig/Operational/8003: Successfully Disconnected from a Wireless Network](network/evtx-8003-wlan-disconnect.md)
- [Security/5156: The Windows Filtering Platform has permitted a connection](network/evtx-5156-wfp-permitted.md)
- [Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational/1149](network/terminal-services-remote-1149.md)
- [Microsoft-Windows-TerminalServices-LocalSessionManager/Operational/21: Session logon succeeded](network/terminal-services-local-21.md)
- [Microsoft-Windows-TerminalServices-LocalSessionManager/Operational/24: Session has been disconnected](network/terminal-services-local-24.md)
- [RDP Persistent Bitmap Cache](network/rdp-bitmap-cache.md)
- [Terminal Server Client Registry Keys](network/terminal-server-client-keys.md)

### Network Activity - Destination Identification
> Can the destination for this activity be identified?
- [TerminalServices-RDPClient/Operational/1024: RDP ClientActiveX is trying to connect to the server](network/evtx-1024-rdp-activex.md)
- [Security/4648: Logon using explicit credentials](account/evtx-4648-explicit-credentials.md)
- [Security/5156: The Windows Filtering Platform has permitted a connection](network/evtx-5156-wfp-permitted.md)

### Network Activity - Source Identification
> Can the source of this activity be identified?
- [TaskScheduler/Operational Log](persistence/task-scheduler-operational-log.md)
- [Scheduled Task Files](persistence/task-scheduler-files.md)
- [Security/4778: Session reconnected](network/evtx-4778-session-reconnected.md)
- [Security/4624: An account was successfully logged on](account/evtx-4624-successful-logon.md)
- [Security/4625: An account failed to log on](account/evtx-4625-failed-logon.md)
- [Security/5156: The Windows Filtering Platform has permitted a connection](network/evtx-5156-wfp-permitted.md)
- [Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational/1149](network/terminal-services-remote-1149.md)
- [Microsoft-Windows-TerminalServices-LocalSessionManager/Operational/21: Session logon succeeded](network/terminal-services-local-21.md)
- [Microsoft-Windows-TerminalServices-LocalSessionManager/Operational/24: Session has been disconnected](network/terminal-services-local-24.md)

### Network Activity - Transmit Volume
> Can the amount of data sent or received be determined?
- [SRUM Database](execution/srum-db.md)

### Network Activity - Browser Activity
> Artifacts supporting general forensic analysis for browser activity on an endpoint
- [places.sqlite](browser/firefox-places-sqlite.md)

(back to top)

### Network Activity - Firewall Activity
> Artifacts supporting general forensic analysis of events pertaining to the Windows Firewall
- [Microsoft-Windows-Windows Firewall With Advanced Security/Firewall/2004: Firewall Rule Added](network/evtx-2004-firewall.md)
- [Microsoft-Windows-Windows Firewall With Advanced Security/Firewall/2071: Firewall Rule Added](network/evtx-2071-firewall-windows-11.md)
- [Microsoft-Windows-Windows Firewall With Advanced Security/Firewall/2005: Firewall Rule Modified](network/evtx-2005-firewall.md)
- [Microsoft-Windows-Windows Firewall With Advanced Security/Firewall/2073: Firewall Rule Modified](network/evtx-2073-firewall-windows-11.md)
- [Microsoft-Windows-Windows Firewall With Advanced Security/Firewall/2006: Firewall Rule Deleted](network/evtx-2006-firewall.md)
- [Microsoft-Windows-Windows Firewall With Advanced Security/Firewall/2052: Firewall Rule Deleted](network/evtx-2052-firewall-windows-11.md)
- [Security/5156: The Windows Filtering Platform has permitted a connection](network/evtx-5156-wfp-permitted.md)

(back to top)

### Network Activity - Wireless Activity
> Artifacts providing evidence of wireless network activity
- [Microsoft-Windows-WLAN-AutoConfig/Operational/8001: Successfully Connected to a Wireless Network](network/evtx-8001-wlan-connect.md)
- [Microsoft-Windows-WLAN-AutoConfig/Operational/8003: Successfully Disconnected from a Wireless Network](network/evtx-8003-wlan-disconnect.md)

(back to top)

## Browser Activity
Network activity artifacts may provide the following information:

### Browser Activity - History
- [Firefox places.sqlite Database](browser/firefox-places-sqlite.md)

### Browser Activity - Bookmarks
- [Firefox places.sqlite Database](browser/firefox-places-sqlite.md)

(back to top)

# User Activity
> These miscellaneous artifacts may provide an analyst information regarding certain actions that a user took on a system.
- [WordWheelQuery](/user-activity/wordwheelquery.md)
- [winget Activity](/user-activity/winget.md)

(back to top)

# Group Policy Activity
> These miscellaneous artifacts may provide an analyst information regarding Group Policy Object (GPO) activity on an Active Directory domain.
- [Microsoft-Windows-GroupPolicy/Operational/4005: Starting manual processing of policy for user](/group-policy/evtx-4005-user-manual-gpo-processing-start.md)
- [Microsoft-Windows-GroupPolicy/Operational/4001: Starting user logon Policy processing](/group-policy/evtx-4001-user-logon-gpo-processing-start.md)
- [System/1503: The Group Policy settings for the user were processed successfully](/group-policy/evtx-1503-user-gpo-success.md)
- [Microsoft-Windows-GroupPolicy/Operational/4004: Starting manual processing of policy for computer](/group-policy/evtx-4004-computer-manual-gpo-processing-start.md)
- [Microsoft-Windows-GroupPolicy/Operational/4000: Starting computer boot policy processing](/group-policy/evtx-4000-computer-boot-gpo-processing-start.md)
- [System/1502: The Group Policy settings for the computer were processed successfully](/group-policy/evtx-1502-computer-gpo-success.md)
- [Microsoft-Windows-GroupPolicy/Operational/5312: List of applicable Group Policy objects](/group-policy/evtx-5312-list-of-gpo.md)

(back to top)

# Enumeration Artifacts
> These artifacts may be leveraged by an analyst to enumerate information from an endpoint that may prove useful during an investigation. While some of these artifacts may not necessarily be looked at for evidence of activity, they may be analyzed to obtain information important to an investigation.

| Arifact | Information |
| - | - |
| [Select](enumeration/select.md) |

  • CurrentControlSet
|
| [CurrentVersion](enumeration/current-version.md) |

  • OS Version

  • Installation Timestamp

|
| [TimeZoneInformation](enumeration/time-zone-information.md) |
  • System Time Zone
|
| [ComputerName](enumeration/computer-name.md) |
  • System Name
|
| [Interfaces](enumeration/interfaces.md) |
  • IP configuration
|
| [Network Cards](enumeration/network-cards.md) |
  • Network Adapter Enumeration
|
| [Group Membership Registry Key](account/group-membership-key.md) |
  • Local account group membership enumeration
|

(back to top)

# Artifact Behavioral Mappings

Additionally, these artifacts may be roughly mapped to the MITRE ATT&CK framework to perform analysis on a behavioral basis:

- [TA0002 - Execution](#ta0002-execution)
- [TA0003 - Persistence](#ta0003-persistence)
- [TA0008 - Lateral Movement](#ta0008-lateral-movement)

## TA0002 Execution
The below artifacts are related to [execution](https://attack.mitre.org/tactics/TA0002/). Execution is defined by MITRE as:

> ...techniques that result in adversary-controlled code running on a local or remote system.

The below artifacts may prove useful in identifying instances of execution on an endpoint:

| Arifact Type | Artifact |
| - | - |
| Filesystem | [Prefetch](execution/prefetch.md) |
| Eventlog | [Security/4688: A new process has been created](execution/evtx-4688-process-created.md) |
| Registry/Memory | [ShimCache](execution/shimcache.md) |
| Registry | [AmCache.hve](execution/amcache.md) |
| Filesystem | [Scheduled Task Files](persistence/task-scheduler-files.md) |
| Eventlog | [TaskScheduler/Operational Log](persistence/task-scheduler-operational-log.md) |
| Registry/Filesystem | [SRUM Database](execution/srum-db.md) |
| Filesystem | [Program Compatibility Assistant (PCA) - PcaAppLaunchDic.txt](execution/program-compatibility-assistant.md) |
| Registry | [Background Activity Montitor](execution/bam-dam.md) |
| Filesystem | [Detection History Files](file-activity/detectionhistory.md) |
| Filesystem | [Program Compatibility Assistant (PCA) - PcaAppLaunchDic.txt](execution/program-compatibility-assistant.md) |
| Registry | [Tracing Registry Keys](network/tracing-keys.md) |
| Eventlog | [Microsoft-Windows-Shell-Core/Operational/9707: Command Execution Started](execution/evtx-9707-shell-core.md) |
| Filesystem | [AutomaticDestinations Jumplists](file-activity/automatic-destinations.md) |
| Filesystem | [Windows Error Reporting Files (.WER)](execution/wer-files.md) |

## TA0003 Persistence
The below artifacts are related to [persistence activities](https://attack.mitre.org/tactics/TA0003/). Persistence is defined by MITRE as:

> Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access.

The below artifacts may prove useful in identifying instances of persistence on an endpoint:

| Arifact Type | Artifact |
| - | - |
| Registry | [Run/RunOnce Keys](persistence/reg-run-runonce.md) |
| Eventlog | [TaskScheduler/Operational Log](persistence/task-scheduler-operational-log.md) |
| Filesystem | [Scheduled Task Files](persistence/task-scheduler-files.md) |
| Eventlog | [Security/4720: A user account was created](account/evtx-4720-account-created.md) |
| Eventlog | [WMI-Activity/Operational/5861: New WMI Event Consumer](persistence/evtx-5861-event-consumer-created.md) |
| Registry | [Image File Execution Options](persistence/image-file-execution-options.md) |
| Eventlog | [Microsoft-Windows-Shell-Core/Operational/9707: Command Execution Started](execution/evtx-9707-shell-core.md) |
| Registry | [Services Registry Keys](persistence/registry-services.md) |
| Eventlog | [Security/7045: Service Installed](persistence/evtx-7045-service-install.md) |
| Registry | [Image File Execution Options](persistence/image-file-execution-options.md) |
| Eventlog | [Microsoft-Windows-Shell-Core/Operational/9707: Command Execution Started](execution/evtx-9707-shell-core.md) |

## TA0008 Lateral Movement
The below artifacts are related to [lateral movement activities](https://attack.mitre.org/tactics/TA0008/). Lateral movement is defined by MITRE as:

> techniques that adversaries use to enter and control remote systems on a network.

The below artifacts may prove useful in identifying instances of lateral movement to or from an endpoint:

| Arifact Type | Artifact |
| - | - |
| Eventlog | [TaskScheduler/Operational Log](persistence/task-scheduler-operational-log.md) |
| Filesystem | [Scheduled Task Files](persistence/task-scheduler-files.md) |
| Eventlog | [Security/4778: Session reconnected](network/evtx-4778-session-reconnected.md) |
| Eventlog | [TerminalServices-RDPClient/Operational/1024: RDP ClientActiveX is trying to connect to the server](network/evtx-1024-rdp-activex.md) |
| Eventlog | [Security/4648: Logon using explicit credentials](account/evtx-4648-explicit-credentials.md) |
| Eventlog | [Security/4624: An account was successfully logged on](account/evtx-4624-successful-logon.md) |
| Eventlog | [Security/4625: An account failed to log on](account/evtx-4625-failed-logon.md) |
| Filesystem | [RDP Persistent Bitmap Cache](network/rdp-bitmap-cache.md) |
| Registry | [Terminal Server Client Registry Keys](network/terminal-server-client-keys.md) |
| Eventlog | [Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational/1149](network/terminal-services-remote-1149.md) |
| Eventlog | [Microsoft-Windows-TerminalServices-LocalSessionManager/Operational/21: Session logon succeeded](network/terminal-services-local-21.md) |
| Eventlog | [Microsoft-Windows-TerminalServices-LocalSessionManager/Operational/24: Session has been disconnected](network/terminal-services-local-24.md) |

(back to top)