Windows Forensics
Windows Forensics
Windows Forensics
Windows Artifacts
Metadata Found :
2. the size of the target when it was last accessed 5. Distributed link tracking information
3. serial number of the volume where the target was 6. Different attributes(read-only, hidden,..)
stored.
Path:
1. C:\Users\%USERNAME%\AppData\Roaming\Microsoft\Windows\Recent
2. C:\Users\%USERNAME%\Downloads
💡 when a file is created in a MS office and is first saved , a link file is created in Recent folder and Office Recent
folder , the one in Office Recent contains the embedded dates , but the one in Recent don’t
Tools : —>LECmd.exe
LECmd.exe -d "C:\..\ Recent " --csv "c:\temp" --html c:\temp --xml c:\temp\xml -q
2- ThumbCache
Thumbnails : when the user use the Thumbnails or Filmstrip views from the Windows folder viewing option , a
small thumbnail will be created and stored in a single file.
Forensic Value :
1. deleted pictrues with it’s version , and the file name and the date of last modificatoin. (cases related to photo)
Location :
C:\Users\[Username]\AppData\Local\Microsoft\Windows\Explorer
💡 Each Thumbcache has it’s own size , and Each size has a separate database
{thumbcache_32.db,thumbcache_256.db}
To map the pictures to the original path as the path dosen’t apper within the tools , you can
map the pictures from Extensible Storage Engine database located in
C:\ProgramData\Microsoft\search\Data\Applications\Windows only use esentutl.exe /p
.\Windows.edb
Windows Forensics 1
Volume Shadow Copy Service : is a set of COM APIs that implements a framework to allow volume backups to be
performed while applications on a system continue to write to the volumes.
You can think of VSC a snapshot for a specific point back in time .
Mechanism :
1. VSC tracks changes to blocks of data on the disk rather than logical files in their entirely
2. when you mount the VSC , it will appear as a mirror of the whole contents of the volume that was monitored.
Windows limits the maximum disk space consumed by VSC snapshots is 5% of the volume size.
Forensic Value
1. cmd as administrator run vssadmin.exe list shadows To List All Shadow Copies
3. open
File History : Windows 8 introduced the file history backup which changes the way backups were used ,as the
backups in pervious versions could be only maintained using default system , but in Win8 the backups are stored
in removable media and remote network shares.
Forensic Value
2. Pc name
Windows Forensics 2
3. ID of User who did the backup
Location in Windows
C:\Users\%Username%\AppData\Local\Microsoft\Windows\FileHistroy\Data
C:\Users\%Username%\AppData\Local\Microsoft\Windows\FileHistroy\Configuration\
4- JumpLists
jumplists : are available on all taskbar icons for applications. Their purpose is to allow easy access to common
tasks for the given application.
Location
1. C:\Users\%USERNAME%\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations
2. C:\Users\%USERNAME%\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations
💡 AutomaticDestinations : are created by the operating systems , CustomDestinations : are created when a
user pins a file to an application via taskbar.
the details of applications that have been pinned to the taskbar are also recorded in registry
values Favorites , FavoritesResolve in
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Taskband
5- Libraries
they are a list of monitored folders {Documents, Pictures, Music, Videos} which used to assist users to find their
media
Location
C:\Users\%USERNAME%\AppData\Roaming\Microsoft\Windows\Libraries\Documents.library-ms
Forensic Value
Knowing the time and the date when a user searched for a specific keyword on the machine.
Location
%ProgramData%\Microsoft\Search\Data\Applications\Windows
Tools —> ESEDatabaseView from NirSoft.
3. <Index#> : a count of the number of deleted files currently tracked by the Recycle Bin
Windows Forensics 3
SO , the new renamed file (DC2.exe) is the deleted file , INFO2 file contains the metadata .
$I contains the {file size, date of deletion, the original name and path}
.\rifiuti-vista.exe -x -z 'C:\$Recycle.Bin\S-1-5-21-3459457667-847189511-749124871-1001\'
💡 to recover the deleted file , copy the $R file to your desktop and use it as the original file.
Mechanism.
Windows Cache Manager tracks the first 2 min of boot processes and the first 10 seconds of all other applications
startup, to speed up the loading process.
1. executable name 1. last time the application ran (10 seconds earlier)
2. absolute path to the exe 2. list of all DLLs used by this program
Location
C:\Windows\Prefetch
💡 sometimes you might come across systems that have no prefetch files in their directory , then you go to
check the registry key for prefetch settings located in
HKLM\SYSTEM\CurrentControlSet\Control\SessionManager\MemoryManagement\PrefetchParameters 0 (no
prefetch) , 1 (apps prefetching only) , 2(boot prefetching only)
9- ShimCache
Application compatibility cache used by windows to quickly identify the applications that require special
compatibility settings to run,
Windows Forensics 4
provides compatibility for older softwares running in newer versions of windows .
Forensic Value
1. executable or script file name and full paths 3. The Standard information last modified date
2. whether the file actually ran on the system (just 4. size of the binary file
browsed through explorer.exe)
💡 when you open windows explorer not even run any program , all executables that you can see will be
shimmed, if you maximize the windows and new executables appear so you can see , it will shimmed when
you reboot or shutdown.
Locations
2. Stored in C:\Windows\System32\Config\SYSTEM
2. S-1-1-0 : A group that includes all users 2. S-1-5-7 : Anonymous logged on Users
5. S-1-3-0 : the user who created a new object 5. S-1-5-21-?????-500 : the system’s Administrator
Registry ArtiFacts
1. Time Zone
SYSTEM\ControlSet###\Control\TimeZoneInformation
Windows Forensics 5
2. Windows Product Info
SOFTWARE\Microsoft\WindowsNT\CurrentVersion
SYSTEM\ControlSet00#\Control\ComputerName\ComputerName
4. Windows Services
SYSTEM\ControlSet00#\Service\
SYSTEM\ControlSet00#\Service\<name>\Start : value inside this subkey determine how the service behave {0=
Boot ,1=system, 2=automatic,3=manual,4=disabled }
SYSTEM\ControlSet00#\Services\Tcpip\Parameters\Interfaces\{GUID}\DhcpIPAddress
SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\
SYSTEM\ControlSet###\Control\FileSystem
8. Autoruns
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
9. Installed Applications
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall
(Private) SYSTEM\ControlSet###\Services\SharedAccess\Parameters\Firewallpolicy\StandardProfile\EnableFirewall
(Public) SYSTEM\ControlSet###\Services\SharedAccess\Parameters\Firewallpolicy\PublicProfile\EnableFirewall
(Domain) SYSTEM\ControlSet###\Services\SharedAccess\Parameters\Firewallpolicy\DomainProfile\EnableFirewall
SYSTEM\ControlSet###\Control\TerminalServer\fDenyTSConnections
Windows Forensics 6
(Cache) HKLM\SOFTWARE\Microsoft\Windows NT\CurrenVersion\NetworkList\Nla\Cache
HKLM\SYSTEM\ControlSet001\Control\Windows\ShutdownTime
14. Applint_Dlls
It is a value contains a list of all DLLs that will be loaded automatically when any user-mod application linked to
user32.dll is launched
💡 if an attacker add a malicious DLL to this value , its code will be injected into every launched applications
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\Windows\Applnit_DLLs
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{GUID}\NukeOnDelete
SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\LastLoggedOnUser
During a live Windows session , the logged on user are recorded in this volatile path
SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\SessionData\<#number of
sessions>\LastLoggedOnSamUser
SAM\Domains\Users
SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList
SAM\SAM\Domains\Account\Users\<32-bit-hex>\UserPasswordHint
SOFTWARE\Microsoft\Windows NT\CurrentVersion\Policies\System\EnableLUA
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Applets\Regedit\LastKey
track files and directories that accessed in Open and Save as menues
Windows Forensics 7
(Recently Accessed) HKEY_USERS\
{SID}\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDIg32\LastvisitedPid
NTUSER.DAT\Software\Microsoft\Internet Explorer\TypedURLs
11- ShellBags
ShellBags : are set of windows registry keys located in NTUSER.dat , USERClass.dat that maintain view , icon,
position and size of folders when using Widows Explorer
Forensic Value
Inforemation persists even when the original directories ,files and physical devices have been removed.
may assist the examiner in looking at the broader picture when only a piece is known.
Location
(NTUSER.dat) HKCU\Software\Microsoft\Windows\ShellNoRoam\BagMRU
(USERClass.dat) HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\
(USERClass.dat) HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags
Location
1. Registry Location
C:\Windows\INF\
Windows Forensics 8
C:\Windows\
3. Cookies
Location
Internet Explorer
1. (Autocomplete data) HKCU\Software\Microsoft\InternetExplorer\Intelliforms\Storage1Autocomplete
HKCU\Software\Microsoft\InternetExplorer\Intelliforms\Storage2Typed URLs
2. (Cache)
\%UERPROFILE%\AppData\Local\Microsoft\Windows\Temporary\Internet Files\
3. Bookmarks
\%UERPROFILE%\Favorites
3. Cookies
\%UERPROFILE%\AppData\Local\Microsoft\Windows\Cookies\Low
Location
C:\Users\<UserName>\AppDara\Romaing\Skype\<>skype-id\
Tools —>skype log viewer , Skyperious
Windows Forensics 9