Manual
search
⌘Ctrlk
Manual
  • BluSapphire Manuals
  • BluSapphire
    • Detections
    • Roles & Permissions
    • Knowledge Base
  • BluGenie
    • Full Function List
    • Functions by Category
    • Artifacts
      • Example Template
      • Tactical Artifacts by Category
        • Combination Query
        • EventLog Query
          • Query for Process execution from unusual directories
          • Query suspicious programs processed by the Task Scheduler using the Event Log
          • Query for unusual instances of rundll32.exe via the Event Log
          • Query for Unusual Instances of rundll32.exe making outbound network connections using SysMon Data
          • Query Suspicious Powershell Command Line Executions
          • Query the Windows System Log for 104, 517, 1102
        • File and Folder Query
        • Network Query
        • Process Query
        • Registry Query
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. BluGeniechevron-right
  2. Artifactschevron-right
  3. Tactical Artifacts by Category

EventLog Query

Query for Process execution from unusual directorieschevron-rightQuery suspicious programs processed by the Task Scheduler using the Event Logchevron-rightQuery for unusual instances of rundll32.exe via the Event Logchevron-rightQuery for Unusual Instances of rundll32.exe making outbound network connections using SysMon Datachevron-rightQuery Suspicious Powershell Command Line Executionschevron-rightQuery the Windows System Log for 104, 517, 1102chevron-right
PreviousQuery Autorun locations for any item nested that is not digitally signedchevron-leftNextQuery for Process execution from unusual directorieschevron-right

Last updated 4 years ago