Application.evtx

C:\Windows\System32\winevt\Logs\Application.evtx

While OS internals flow into System.evtx, user-space applications write their operational diaries here. This log is typically noisy and jurisdiction is broad - any application that calls the Windows Event Log API can write to it. That breadth is exactly what makes it forensically interesting: crashes, stack traces and database errors from exploited services land here before anywhere else.

Log Channel Application - written by any user-mode application via the Windows Event Log API
Trace Type Application Health Crash Reporting Runtime Errors
Req. Audit Policy No Active by default. No additional configuration is required - applications write here natively.
User Specific No System-wide. Captures events from all applications regardless of the active user session.

General

Application.evtx is the catch-all channel for user-mode software. Enterprise platforms like Exchange, SQL Server, IIS and third-party AV suites funnel their operational status through here. Because there is no central schema, the signal-to-noise ratio is lower than Security or System - but targeted analysis pays off. When a vulnerable application is exploited, the crash, the Access Violation exception and the faulting module often appear in this log within milliseconds of the attack, giving you a precise exploitation timestamp even without network captures.

Traces

The most forensically significant Event IDs in the Application log are:

Event ID Description
1000 Application Error (Windows Error Reporting). Records the faulting application name, version, faulting module and exception code. Critical for correlating exploitation attempts.
1001 Windows Error Reporting follow-up. Documents whether a crash report was submitted, and may include a WER bucket ID for further analysis.
1026 .NET Runtime error. Indicates an unhandled exception in a managed application - useful when investigating .NET-based malware or exploit payloads.
11724 Product uninstalled (MSI). Logged by Windows Installer when a product is removed - can indicate an attacker cleaning up a dropped tool.

Forensic Value