Application.evtx
C:\Windows\System32\winevt\Logs\Application.evtxWhile OS internals flow into System.evtx, user-space applications write their operational diaries here. This log is typically noisy and jurisdiction is broad - any application that calls the Windows Event Log API can write to it. That breadth is exactly what makes it forensically interesting: crashes, stack traces and database errors from exploited services land here before anywhere else.
Application - written by any user-mode application via the Windows Event Log API
General
Application.evtx is the catch-all channel for user-mode software. Enterprise platforms like Exchange, SQL Server, IIS and third-party AV suites funnel their operational status through here. Because there is no central schema, the signal-to-noise ratio is lower than Security or System - but targeted analysis pays off. When a vulnerable application is exploited, the crash, the Access Violation exception and the faulting module often appear in this log within milliseconds of the attack, giving you a precise exploitation timestamp even without network captures.
Traces
The most forensically significant Event IDs in the Application log are:
| Event ID | Description |
|---|---|
| 1000 | Application Error (Windows Error Reporting). Records the faulting application name, version, faulting module and exception code. Critical for correlating exploitation attempts. |
| 1001 | Windows Error Reporting follow-up. Documents whether a crash report was submitted, and may include a WER bucket ID for further analysis. |
| 1026 | .NET Runtime error. Indicates an unhandled exception in a managed application - useful when investigating .NET-based malware or exploit payloads. |
| 11724 | Product uninstalled (MSI). Logged by Windows Installer when a product is removed - can indicate an attacker cleaning up a dropped tool. |
Forensic Value
- Pinpoint exploit timestamps: Correlating a 1000 (Application Error) event against concurrent network intrusion alerts can identify the exact moment a web application exploit succeeded - without needing a packet capture.
- Identify faulting modules: The faulting module field in Event ID 1000 frequently names the vulnerable DLL or shellcode-loaded module, providing a direct link to the exploit technique used.
- Detect managed malware failure: Unhandled .NET exceptions (Event ID 1026) from unexpected processes or paths reveal .NET-based droppers and post-exploitation frameworks that encountered errors during execution.
- Track attacker tool removal: MSI uninstallation events (11724) following a period of attack activity suggest deliberate cleanup of remotely-installed software or C2 agents.